Performance modelling and evaluation of enterprise information security technologies

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

By providing effective access control mechanisms, enterprise information security technologies have been proven successful in protecting the confidentiality of sensitive information in business organizations. However, such security mechanisms typically reduce the work productivity of the staff, by making them spend time working on non-project related tasks. Therefore, organizations have to invest a signification amount of capital in the information security technologies, and then to continue incurring additional costs. In this study, we investigate the performance of administrators in an information help desk, and the non-productive time (NPT) in an organization, resulting from the implementation of information security technologies. An approximate analytical solution is discussed first, and the loss of staff member productivity is quantified using non-productive time. Stochastic Petri nets are then used to provide simulation results. The presented study can help information security managers to make investment decisions, and to take actions toward reducing the cost of information security technologies, so that a balance is kept between information security expense, resource drain and effectiveness of security technologies.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE International Conference on Computer and Information Technology, CIT 2014
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages504-511
Number of pages8
ISBN (Electronic)9781479962389
DOIs
Publication statusPublished - 12 Dec 2014
Event14th IEEE International Conference on Computer and Information Technology, CIT 2014 - Xi'an, Shaanxi, China
Duration: 11 Sept 201413 Sept 2014

Publication series

NameProceedings - 2014 IEEE International Conference on Computer and Information Technology, CIT 2014

Conference

Conference14th IEEE International Conference on Computer and Information Technology, CIT 2014
Country/TerritoryChina
CityXi'an, Shaanxi
Period11/09/1413/09/14

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Non-productive Time
  • Queuing Theory
  • Security Investment Decision
  • Stochastic Petri Nets

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Performance modelling and evaluation of enterprise information security technologies'. Together they form a unique fingerprint.

Cite this