Home > Research > Publications & Outputs > Information assurance techniques

Links

Text available via DOI:

View graph of relations

Information assurance techniques: perceived cost effectiveness

Research output: Contribution to journalJournal article

Published
<mark>Journal publication date</mark>07/2016
<mark>Journal</mark>Computers and Security
Volume60
Number of pages17
Pages (from-to)117-133
<mark>State</mark>Published
Early online date14/04/16
<mark>Original language</mark>English

Abstract

The assurance technique is a fundamental component of the assurance ecosystem; it is the mechanism by which we assess security to derive a measure of assurance. Despite this importance, the characteristics of these assurance techniques have not been comprehensively explored within academic research from the perspective of industry stakeholders. Here, a framework of 20 “assurance techniques” is defined along with their interdependencies. A survey was conducted which received 153 responses from industry stakeholders, in order to determine perceptions of the characteristics of these assurance techniques. These characteristics include the expertise required, number of people required, time required for completion, effectiveness and cost. The extent to which perceptions differ between those in practitioner and management roles is considered. The findings were then used to compute a measure of cost-effectiveness for each assurance technique. Survey respondents were also asked about their perceptions of complementary assurance techniques. These findings were used to establish 15 combinations, of which the combined effectiveness and cost-effectiveness was assessed.

Bibliographic note

This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 60, 2016 DOI: 10.1016/j.cose.2016.03.009