Development of methods for identifying an appropriate benchmarking peer to establish information security policy
- Authors
- Kang, Martin; Hovav, Anat; Lee, Euntae T.; Um, Sungyong; Kim, Horim
- Issue Date
- Sep-2022
- Publisher
- Pergamon Press Ltd.
- Keywords
- Benchmarking; Gaussian process; Information security policy; Machine learning; Method development; VSS
- Citation
- Expert Systems with Applications, v.201, pp 1 - 11
- Pages
- 11
- Indexed
- SCIE
SCOPUS
- Journal Title
- Expert Systems with Applications
- Volume
- 201
- Start Page
- 1
- End Page
- 11
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/115263
- DOI
- 10.1016/j.eswa.2022.117028
- ISSN
- 0957-4174
1873-6793
- Abstract
- Benchmarking methodology provides organizations with appropriate information security policy. However, selecting an appropriate organization as a benchmarking peer can be a challenge due to firms’ heterogeneous implementation and usage of information systems. Our goal is to develop and propose methods to appropriately identify a benchmarking peer organization by incorporating machine learning methods and mathematics set theory. We incorporate vague soft set, entropy, dynamic time warping, and Gaussian process. We use log data from information security management systems in multiple companies to validate our methods. Our experimental results indicate that the combined use of Gaussian process, vague soft set, and dynamic time warping can be more effective in identifying an appropriate benchmarking peer than conventional machine learning methods. © 2022 Elsevier Ltd
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF BUSINESS AND ECONOMICS > DIVISION OF BUSINESS ADMINISTRATION > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.