TY - GEN
T1 - An information security ontology incorporating human-behavioural implications
AU - Parkin, Simon E.
AU - Van Moorsel, Aad
AU - Coles, Robert
PY - 2009
Y1 - 2009
N2 - Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation's information security management procedures. To further the comprehension of human-behavioural factors we develop an information security ontology. This ontology is intended for organisations that aim to maintain compliance with external standards (in this case ISO27002) while considering the security behaviours of individuals within the organisation. We demonstrate use of our ontology with an applied example concerning management of an organisation's password policy, and how it may be perceived by individuals in the organisation. We formally represent information security controls and findings regarding human behaviour, and relate these to each other and the accomplishment of standards compliance. In doing so we provide a model that information security managers can use to consider the impact of their security management decisions.
AB - Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation's information security management procedures. To further the comprehension of human-behavioural factors we develop an information security ontology. This ontology is intended for organisations that aim to maintain compliance with external standards (in this case ISO27002) while considering the security behaviours of individuals within the organisation. We demonstrate use of our ontology with an applied example concerning management of an organisation's password policy, and how it may be perceived by individuals in the organisation. We formally represent information security controls and findings regarding human behaviour, and relate these to each other and the accomplishment of standards compliance. In doing so we provide a model that information security managers can use to consider the impact of their security management decisions.
KW - Human behavioural implications
KW - Information security ontology
KW - Password policy
UR - https://www.scopus.com/pages/publications/70350630540
U2 - 10.1145/1626195.1626209
DO - 10.1145/1626195.1626209
M3 - Conference contribution
AN - SCOPUS:70350630540
SN - 9781605584126
T3 - SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks
SP - 46
EP - 55
BT - SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks
T2 - 2nd International Conference on Security of Information and Networks, SIN'09
Y2 - 6 October 2009 through 10 October 2009
ER -