Key Components of an Information Security Metrics Program Plan
dc.contributor.author | Schimkowitsch, Scott E. | |
dc.date.accessioned | 2009-07-22T19:38:33Z | |
dc.date.available | 2009-07-22T19:38:33Z | |
dc.date.issued | 2009-07-22T19:38:33Z | |
dc.description | This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu]. | en_US |
dc.description.abstract | An information security metrics program can provide organizations with a resource to manage, monitor, control, or improve aspects of an information security program. A set of five key components necessary to include when developing a plan for an information security metrics program is presented. Components are framed in relation to criteria from Chew et al. (2008), and include associated tasks designed to a) increase accountability, b) improve information security effectiveness and c) demonstrate compliance. | en_US |
dc.identifier.uri | https://hdl.handle.net/1794/9479 | |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | AIM Capstone 2009;Scott E. Schimkowitsch | |
dc.subject | Information security | en_US |
dc.subject | Accountability | |
dc.subject | Compliance | |
dc.subject | Applied Information Management | |
dc.subject | AIM | |
dc.subject | Data | |
dc.title | Key Components of an Information Security Metrics Program Plan | en_US |
dc.type | Other | en_US |