Key Components of an Information Security Metrics Program Plan

dc.contributor.authorSchimkowitsch, Scott E.
dc.date.accessioned2009-07-22T19:38:33Z
dc.date.available2009-07-22T19:38:33Z
dc.date.issued2009-07-22T19:38:33Z
dc.descriptionThis paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu].en_US
dc.description.abstractAn information security metrics program can provide organizations with a resource to manage, monitor, control, or improve aspects of an information security program. A set of five key components necessary to include when developing a plan for an information security metrics program is presented. Components are framed in relation to criteria from Chew et al. (2008), and include associated tasks designed to a) increase accountability, b) improve information security effectiveness and c) demonstrate compliance.en_US
dc.identifier.urihttps://hdl.handle.net/1794/9479
dc.language.isoen_USen_US
dc.relation.ispartofseriesAIM Capstone 2009;Scott E. Schimkowitsch
dc.subjectInformation securityen_US
dc.subjectAccountability
dc.subjectCompliance
dc.subjectApplied Information Management
dc.subjectAIM
dc.subjectData
dc.titleKey Components of an Information Security Metrics Program Planen_US
dc.typeOtheren_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Schimkowitsch-2009.pdf
Size:
449.27 KB
Format:
Adobe Portable Document Format
Description:
AIM Terminal Project
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
2.21 KB
Format:
Item-specific license agreed upon to submission
Description: