SlideShare uma empresa Scribd logo
1 de 11
Information Availability as Driver of
Information Security Investments:
A Systematic Review Approach
Duy P.T. Dang & Mathews Z. Nkhoma
The problems
Making investment decisions for information security is difficult:
–Too much uncertainty / asymmetric information
–What are the values of information security investments?
–How to measure ROI?
Low information security investments
Firms are at risks against cyber-threats
The current solutions
Encourage
information
sharing
Reduce
asymmetric
information
Improve
awareness
about
information
security
Improve
investment in
information
security
Does Information only has indirect driving relationship
with Information security investments through the
increase of Awareness?
Research questions
• RQ1: What have been done to investigate their
driving function since 2007?
• RQ2: Can information availability (internal and
external) drive information security investments?
 Information Availability’s role in investment is
emphasised
Research methodology
• Systematic Literature Review
–Contemporary literature review method
–Covers detailed information during the LR process that is
identifiable and reproducible for future research
• Consists of two parts:
–Descriptive analysis:
Provides the big picture of the literature’s theme
Descriptive statistics to identify the trends over periods of time
–Thematic analysis:
How to reproduce the LR process
Identify the themes and analyse the collected data to come up
with organised findings
Research findings (1) – Descriptive Analysis
RQ1: What have been done to investigate IA driving function
since 2007?
Research findings (1) – Descriptive Analysis
Research findings (2) – Thematic Analysis
RQ2: Can information availability (internal and external) drive
information security investments?
• Few confirmatory studies indicate that information can directly drive
information security investments; despite
–The exploratory literature suggests information availability can
contribute to evaluation of needs to invest in information security
–Focuses much on development of new tools and methods to
evaluate information security investments
Synthesis and the way forward
• We encourage future research to focus on
investigating the driving function of Information
Availability to information security investments
• We are also conducting an ongoing research on
this topic by surveying 500+ IT decision-makers
in Vietnam
Synthesis and the way forward
Q&A
•Duy Dang
–dptdang@gmail.com
–http://rmit.academia.edu/duydang
•Dr. Mathews Nkhoma
–mathews.nkhoma@gmail.com
–http://rmit-
vn.academia.edu/MATHEWSNKHOMA

Mais conteúdo relacionado

Mais procurados

Nyakairu_Resume_March2015
Nyakairu_Resume_March2015Nyakairu_Resume_March2015
Nyakairu_Resume_March2015
Joan Nyakairu
 

Mais procurados (8)

University of Missouri-Columbia, Frequent Hierarchical Pattern (FHP) Tree
University of Missouri-Columbia, Frequent Hierarchical Pattern (FHP) TreeUniversity of Missouri-Columbia, Frequent Hierarchical Pattern (FHP) Tree
University of Missouri-Columbia, Frequent Hierarchical Pattern (FHP) Tree
 
Enrico Bisogno - United Nations Office on Drugs and Crime (UNODC)
Enrico Bisogno - United Nations Office on Drugs and Crime (UNODC)Enrico Bisogno - United Nations Office on Drugs and Crime (UNODC)
Enrico Bisogno - United Nations Office on Drugs and Crime (UNODC)
 
Unit 3 introduction
Unit 3 introductionUnit 3 introduction
Unit 3 introduction
 
Nyakairu_Resume_March2015
Nyakairu_Resume_March2015Nyakairu_Resume_March2015
Nyakairu_Resume_March2015
 
A picture is worth a thousand words
A picture is worth a thousand wordsA picture is worth a thousand words
A picture is worth a thousand words
 
Introduction to Data4Impact
Introduction to Data4ImpactIntroduction to Data4Impact
Introduction to Data4Impact
 
Software Analytics
Software AnalyticsSoftware Analytics
Software Analytics
 
Let’s compare! Practical perspectives on the use of an international comparat...
Let’s compare! Practical perspectives on the use of an international comparat...Let’s compare! Practical perspectives on the use of an international comparat...
Let’s compare! Practical perspectives on the use of an international comparat...
 

Destaque

Lease Station Introduction
Lease Station IntroductionLease Station Introduction
Lease Station Introduction
scottowens
 
Project report on online trading and demat
Project report on online trading and dematProject report on online trading and demat
Project report on online trading and demat
sankar922
 
Lease Station Introduction
Lease Station IntroductionLease Station Introduction
Lease Station Introduction
scottowens
 
Project report on online trading and demat
Project report on online trading and dematProject report on online trading and demat
Project report on online trading and demat
sankar922
 

Destaque (14)

Lease Station Introduction
Lease Station IntroductionLease Station Introduction
Lease Station Introduction
 
Portfolio
PortfolioPortfolio
Portfolio
 
Project report on online trading and demat
Project report on online trading and dematProject report on online trading and demat
Project report on online trading and demat
 
Professional Overview
Professional OverviewProfessional Overview
Professional Overview
 
Lease Station Introduction
Lease Station IntroductionLease Station Introduction
Lease Station Introduction
 
Important articles about internet business
Important articles about internet businessImportant articles about internet business
Important articles about internet business
 
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
 
Project report on online trading and demat
Project report on online trading and dematProject report on online trading and demat
Project report on online trading and demat
 
Η ασπίδα του Αχιλλέα
Η ασπίδα του ΑχιλλέαΗ ασπίδα του Αχιλλέα
Η ασπίδα του Αχιλλέα
 
Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...
 
Presentazione apr 2014
Presentazione apr 2014Presentazione apr 2014
Presentazione apr 2014
 
Παιχνίδια...πριν το καλοκαίρι
Παιχνίδια...πριν το καλοκαίριΠαιχνίδια...πριν το καλοκαίρι
Παιχνίδια...πριν το καλοκαίρι
 
περπατώντας...
περπατώντας...περπατώντας...
περπατώντας...
 
الإعلام
الإعلام الإعلام
الإعلام
 

Semelhante a Dang and Nkhoma (2013), "Information Availability as Driver of Information Security Investments: a Systematic Review Approach", ICIME 2013

Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Glenn Villanueva
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - Poster
Andrew Kerr
 

Semelhante a Dang and Nkhoma (2013), "Information Availability as Driver of Information Security Investments: a Systematic Review Approach", ICIME 2013 (20)

Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness ProgrammeTowards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programme
 
John Eberhardt NSTAC Testimony
John Eberhardt NSTAC TestimonyJohn Eberhardt NSTAC Testimony
John Eberhardt NSTAC Testimony
 
SOC2002 Lecture 2
SOC2002 Lecture 2SOC2002 Lecture 2
SOC2002 Lecture 2
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
The NIH as a Digital Enterprise: Implications for PAG
The NIH as a Digital Enterprise: Implications for PAGThe NIH as a Digital Enterprise: Implications for PAG
The NIH as a Digital Enterprise: Implications for PAG
 
KTDRR Measuring for Impact_Peter Levesque
KTDRR Measuring for Impact_Peter LevesqueKTDRR Measuring for Impact_Peter Levesque
KTDRR Measuring for Impact_Peter Levesque
 
Research design
Research designResearch design
Research design
 
Big data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challengesBig data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challenges
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
Ho3313111316
Ho3313111316Ho3313111316
Ho3313111316
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - Poster
 
Methodology of CVE Research - Sajid Amit.pdf
Methodology of CVE Research - Sajid Amit.pdfMethodology of CVE Research - Sajid Amit.pdf
Methodology of CVE Research - Sajid Amit.pdf
 
Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
Basics of research in research methodology
Basics of research in research methodologyBasics of research in research methodology
Basics of research in research methodology
 
Taylor - Grants data nd machine learning based research classifications as an...
Taylor - Grants data nd machine learning based research classifications as an...Taylor - Grants data nd machine learning based research classifications as an...
Taylor - Grants data nd machine learning based research classifications as an...
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 
Data at the NIH
Data at the NIHData at the NIH
Data at the NIH
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Dang and Nkhoma (2013), "Information Availability as Driver of Information Security Investments: a Systematic Review Approach", ICIME 2013

  • 1. Information Availability as Driver of Information Security Investments: A Systematic Review Approach Duy P.T. Dang & Mathews Z. Nkhoma
  • 2. The problems Making investment decisions for information security is difficult: –Too much uncertainty / asymmetric information –What are the values of information security investments? –How to measure ROI? Low information security investments Firms are at risks against cyber-threats
  • 3. The current solutions Encourage information sharing Reduce asymmetric information Improve awareness about information security Improve investment in information security Does Information only has indirect driving relationship with Information security investments through the increase of Awareness?
  • 4. Research questions • RQ1: What have been done to investigate their driving function since 2007? • RQ2: Can information availability (internal and external) drive information security investments?  Information Availability’s role in investment is emphasised
  • 5. Research methodology • Systematic Literature Review –Contemporary literature review method –Covers detailed information during the LR process that is identifiable and reproducible for future research • Consists of two parts: –Descriptive analysis: Provides the big picture of the literature’s theme Descriptive statistics to identify the trends over periods of time –Thematic analysis: How to reproduce the LR process Identify the themes and analyse the collected data to come up with organised findings
  • 6. Research findings (1) – Descriptive Analysis RQ1: What have been done to investigate IA driving function since 2007?
  • 7. Research findings (1) – Descriptive Analysis
  • 8. Research findings (2) – Thematic Analysis RQ2: Can information availability (internal and external) drive information security investments? • Few confirmatory studies indicate that information can directly drive information security investments; despite –The exploratory literature suggests information availability can contribute to evaluation of needs to invest in information security –Focuses much on development of new tools and methods to evaluate information security investments
  • 9. Synthesis and the way forward • We encourage future research to focus on investigating the driving function of Information Availability to information security investments • We are also conducting an ongoing research on this topic by surveying 500+ IT decision-makers in Vietnam
  • 10. Synthesis and the way forward
  • 11. Q&A •Duy Dang –dptdang@gmail.com –http://rmit.academia.edu/duydang •Dr. Mathews Nkhoma –mathews.nkhoma@gmail.com –http://rmit- vn.academia.edu/MATHEWSNKHOMA

Notas do Editor

  1. This is good opportunity to conduct quantitaive and modeling research to use theory to test the concepts that were drawn out from tour literature review
  2. And to encourage future research on this topic of IA driving functino, I would like to show you one of the results from our ongoing studyThe graph shows that 30.16 percent of Vietnamaeseorganisations indicated that internal technical and recommendations are the main drivers of their info securitinvesmtnets. Therefore, it shows that there are a lot of opportunities for future research to investigate deeper into the subject matter of IA driving function so that we can solve this piece of puzzle in informatino security investment field.