Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Development of methods for identifying an appropriate benchmarking peer to establish information security policy

Authors
Kang, MartinHovav, AnatLee, Euntae T.Um, SungyongKim, Horim
Issue Date
Sep-2022
Publisher
Pergamon Press Ltd.
Keywords
Benchmarking; Gaussian process; Information security policy; Machine learning; Method development; VSS
Citation
Expert Systems with Applications, v.201, pp 1 - 11
Pages
11
Indexed
SCIE
SCOPUS
Journal Title
Expert Systems with Applications
Volume
201
Start Page
1
End Page
11
URI
https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/115263
DOI
10.1016/j.eswa.2022.117028
ISSN
0957-4174
1873-6793
Abstract
Benchmarking methodology provides organizations with appropriate information security policy. However, selecting an appropriate organization as a benchmarking peer can be a challenge due to firms’ heterogeneous implementation and usage of information systems. Our goal is to develop and propose methods to appropriately identify a benchmarking peer organization by incorporating machine learning methods and mathematics set theory. We incorporate vague soft set, entropy, dynamic time warping, and Gaussian process. We use log data from information security management systems in multiple companies to validate our methods. Our experimental results indicate that the combined use of Gaussian process, vague soft set, and dynamic time warping can be more effective in identifying an appropriate benchmarking peer than conventional machine learning methods. © 2022 Elsevier Ltd
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF BUSINESS AND ECONOMICS > DIVISION OF BUSINESS ADMINISTRATION > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE