DocumentCode :
2356421
Title :
A framework for evaluating IT security investments in a banking environment
Author :
Smith, E.H. ; Kruger, H.A.
Author_Institution :
BIQueue, Johannesburg, South Africa
fYear :
2010
fDate :
2-4 Aug. 2010
Firstpage :
1
Lastpage :
7
Abstract :
The amount of effort that can be expended on information security depends on funds available and management decisions. Organisations therefore have to prepare an annual budget for the maintenance and improvement of their information security systems. Two of the key issues that confront IT management, when dealing with IT security investments, are how to spend the IT security budget most effectively, and how to make the case for an increase in funds to maintain and further enhance information security. The aim of this paper is to present a quantitative framework as an alternative way of analysing IT security investments in a banking environment in order to address the two issues mentioned above. A two step framework is proposed. The first step utilizes a cluster analysis (CA) technique and the second step employs a linear programming technique called data envelopment analysis (DEA). The purpose of the clustering step is to ensure that evaluations are carried out in groups of homogenous bank branches while the purpose of the DEA model is to determine which of the branches make efficient use of the IT security resources available to them. Following a brief discussion of the proposed framework and techniques used, an illustrative example, based on a well known South African financial institution, is presented.
Keywords :
banking; budgeting; data envelopment analysis; information technology; investment; linear programming; security of data; software development management; software maintenance; statistical analysis; IT management; IT security budget; IT security investments; IT security resources; annual budget; banking environment; cluster analysis; data envelopment analysis; information security systems; linear programming technique; maintenance; management decisions; Biological system modeling; Clustering algorithms; Customer satisfaction; Information security; Investments; Partitioning algorithms; IT security investment; cluster analysis; data envelopment analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security for South Africa (ISSA), 2010
Conference_Location :
Sandton, Johannesburg
Print_ISBN :
978-1-4244-5493-8
Type :
conf
DOI :
10.1109/ISSA.2010.5588343
Filename :
5588343
Link To Document :
بازگشت