Reference Hub4
Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets

Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets

Dhanya Pramod, S. Vijayakumar Bharathi
Copyright: © 2018 |Volume: 20 |Issue: 3 |Pages: 22
ISSN: 1548-7717|EISSN: 1548-7725|EISBN13: 9781522542346|DOI: 10.4018/JCIT.2018070104
Cite Article Cite Article

MLA

Pramod, Dhanya, and S. Vijayakumar Bharathi. "Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets." JCIT vol.20, no.3 2018: pp.48-69. http://doi.org/10.4018/JCIT.2018070104

APA

Pramod, D. & Bharathi, S. V. (2018). Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets. Journal of Cases on Information Technology (JCIT), 20(3), 48-69. http://doi.org/10.4018/JCIT.2018070104

Chicago

Pramod, Dhanya, and S. Vijayakumar Bharathi. "Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets," Journal of Cases on Information Technology (JCIT) 20, no.3: 48-69. http://doi.org/10.4018/JCIT.2018070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the digital era, organization-wide information security risk assessment has gained importance because it can impact businesses in many ways. In this article, the authors propose a model to assess the information security risk using Fuzzy Petri Nets (FPN). Deeply rooted in the OCTAVE framework, this research presents a taxonomy of risk practice areas and risk factors. The authors apply the constituents of the taxonomy to risk assessment through a well-defined FPN model. The primary motive of the article is to extend the usability of FPNs to newer and less explored domains like audit and evaluation of information security risks. The unique contribution of this article is the definition and development of a comprehensive and measurable model of risk assessment and quantification. The model can also serve as a tool to capture the risk perception of the respondents for validating the criticality of risk and facilitate the top management to invest in information security control eco-system judiciously.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.