Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and grow...
| Main Authors: | , , , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/1/1570255495a.pdf http://irep.iium.edu.my/50428/4/50428_abstract.pdf |
| _version_ | 1848783642565804032 |
|---|---|
| author | Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah |
| author_facet | Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah |
| author_sort | Al-Shawabkeh, Mahmoud M. M. |
| building | IIUM Repository |
| collection | Online Access |
| description | Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies. |
| first_indexed | 2025-11-14T16:24:36Z |
| format | Proceeding Paper |
| id | iium-50428 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English English |
| last_indexed | 2025-11-14T16:24:36Z |
| publishDate | 2016 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-504282018-05-23T02:05:23Z http://irep.iium.edu.my/50428/ Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah HF5001 Business. Business Administration QA75 Electronic computers. Computer science TK7885 Computer engineering Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies. 2016-04-19 Proceeding Paper NonPeerReviewed application/pdf en http://irep.iium.edu.my/50428/1/1570255495a.pdf application/pdf en http://irep.iium.edu.my/50428/4/50428_abstract.pdf Al-Shawabkeh, Mahmoud M. M. and Mohd Saudi, Madihah and Mohd Alwi, Najwa Hayati and Azman, Norhidayah (2016) Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison. In: 2016 3rd International Conference on Computer, Communication and Control Technology (I4CT), 19th-21st Apr. 2016, Kota Kinabalu, Sabah. (Unpublished) https://i4ct.org/ |
| spellingShingle | HF5001 Business. Business Administration QA75 Electronic computers. Computer science TK7885 Computer engineering Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
| title | Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
| title_full | Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
| title_fullStr | Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
| title_full_unstemmed | Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
| title_short | Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
| title_sort | information security management systems (isms) and computer security self-efficacy (csse) model comparison |
| topic | HF5001 Business. Business Administration QA75 Electronic computers. Computer science TK7885 Computer engineering |
| url | http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/1/1570255495a.pdf http://irep.iium.edu.my/50428/4/50428_abstract.pdf |