An information security ontology incorporating human-behavioural implications

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation's information security management procedures. To further the comprehension of human-behavioural factors we develop an information security ontology. This ontology is intended for organisations that aim to maintain compliance with external standards (in this case ISO27002) while considering the security behaviours of individuals within the organisation. We demonstrate use of our ontology with an applied example concerning management of an organisation's password policy, and how it may be perceived by individuals in the organisation. We formally represent information security controls and findings regarding human behaviour, and relate these to each other and the accomplishment of standards compliance. In doing so we provide a model that information security managers can use to consider the impact of their security management decisions.

Original languageEnglish
Title of host publicationSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks
Pages46-55
Number of pages10
DOIs
Publication statusPublished - 2009
Event2nd International Conference on Security of Information and Networks, SIN'09 - Famagusta, Cyprus
Duration: 6 Oct 200910 Oct 2009

Publication series

NameSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks

Conference

Conference2nd International Conference on Security of Information and Networks, SIN'09
Country/TerritoryCyprus
CityFamagusta
Period6/10/0910/10/09

Keywords

  • Human behavioural implications
  • Information security ontology
  • Password policy

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'An information security ontology incorporating human-behavioural implications'. Together they form a unique fingerprint.

Cite this