Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison

Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and grow...

Full description

Bibliographic Details
Main Authors: Al-Shawabkeh, Mahmoud M. M., Mohd Saudi, Madihah, Mohd Alwi, Najwa Hayati, Azman, Norhidayah
Format: Proceeding Paper
Language:English
English
Published: 2016
Subjects:
Online Access:http://irep.iium.edu.my/50428/
http://irep.iium.edu.my/50428/1/1570255495a.pdf
http://irep.iium.edu.my/50428/4/50428_abstract.pdf
_version_ 1848783642565804032
author Al-Shawabkeh, Mahmoud M. M.
Mohd Saudi, Madihah
Mohd Alwi, Najwa Hayati
Azman, Norhidayah
author_facet Al-Shawabkeh, Mahmoud M. M.
Mohd Saudi, Madihah
Mohd Alwi, Najwa Hayati
Azman, Norhidayah
author_sort Al-Shawabkeh, Mahmoud M. M.
building IIUM Repository
collection Online Access
description Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies.
first_indexed 2025-11-14T16:24:36Z
format Proceeding Paper
id iium-50428
institution International Islamic University Malaysia
institution_category Local University
language English
English
last_indexed 2025-11-14T16:24:36Z
publishDate 2016
recordtype eprints
repository_type Digital Repository
spelling iium-504282018-05-23T02:05:23Z http://irep.iium.edu.my/50428/ Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah HF5001 Business. Business Administration QA75 Electronic computers. Computer science TK7885 Computer engineering Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies. 2016-04-19 Proceeding Paper NonPeerReviewed application/pdf en http://irep.iium.edu.my/50428/1/1570255495a.pdf application/pdf en http://irep.iium.edu.my/50428/4/50428_abstract.pdf Al-Shawabkeh, Mahmoud M. M. and Mohd Saudi, Madihah and Mohd Alwi, Najwa Hayati and Azman, Norhidayah (2016) Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison. In: 2016 3rd International Conference on Computer, Communication and Control Technology (I4CT), 19th-21st Apr. 2016, Kota Kinabalu, Sabah. (Unpublished) https://i4ct.org/
spellingShingle HF5001 Business. Business Administration
QA75 Electronic computers. Computer science
TK7885 Computer engineering
Al-Shawabkeh, Mahmoud M. M.
Mohd Saudi, Madihah
Mohd Alwi, Najwa Hayati
Azman, Norhidayah
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
title Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
title_full Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
title_fullStr Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
title_full_unstemmed Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
title_short Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
title_sort information security management systems (isms) and computer security self-efficacy (csse) model comparison
topic HF5001 Business. Business Administration
QA75 Electronic computers. Computer science
TK7885 Computer engineering
url http://irep.iium.edu.my/50428/
http://irep.iium.edu.my/50428/
http://irep.iium.edu.my/50428/1/1570255495a.pdf
http://irep.iium.edu.my/50428/4/50428_abstract.pdf