Access the full text.
Sign up today, get DeepDyve free for 14 days.
Kenneth Geers (2010)
Cyber Weapons ConventionComput. Law Secur. Rev., 26
Sanjay Jharkharia, R. Shankar (2004)
IT enablement of supply chains: modeling the enablersInternational Journal of Productivity and Performance Management, 53
Kenneth Geers (2010)
The challenge of cyber attack deterrenceComput. Law Secur. Rev., 26
F. Parente, Janet Anderson, Patrick Myers, Thomas O'brien (1984)
An examination of factors contributing to delphi accuracyJournal of Forecasting, 3
J. Forsyth (2013)
What Great Powers Make It: International Order and the Logic of Cooperation in Cyberspace
E. Chew, Marianne Swanson, Kevin Stine, Nadya Bartol, Anthony Brown, Will Robinson (2008)
Performance Measurement Guide for Information Security
O. Jung, A. Berger, M. Hirschbichler, Ivan Gojmerac, Hans Lippitsch, Mario Tscherwenka, K. Umschaden (2010)
IMS security and what we should learn from the Internete & i Elektrotechnik und Informationstechnik, 127
C. Ku, Yiwen Chang, D. Yen (2009)
National information security policy and its implementation: A case study in TaiwanTelecommunications Policy, 33
W. Oliver (2009)
Policing for Homeland SecurityCriminal Justice Policy Review, 20
C. Colwill (2009)
Human factors in information security: The insider threat - Who can you trust these days?Inf. Secur. Tech. Rep., 14
E. Anderson, J. Choobineh (2008)
Enterprise information security strategiesComput. Secur., 27
R. Bolanos, E. Fontela, Alfredo Nenclares, P. Pastor (2005)
Using interpretive structural modelling in strategic decision‐making groupsManagement Decision, 43
Steve Hawkins, D. Yen, D. Chou (2000)
Awareness and challenges of Internet securityInf. Manag. Comput. Secur., 8
H. Linstone, M. Turoff (1976)
The Delphi method : techniques and applications
P. Williams, C. Webb (1994)
The Delphi technique: a methodological discussion.Journal of advanced nursing, 19 1
Kuo-Chung Chang, Chih-ping Wang (2011)
Information systems resources and information securityInformation Systems Frontiers, 13
Kim-Kwang Choo (2011)
The cyber threat landscape: Challenges and future research directionsComput. Secur., 30
N. Dalkey, O. Helmer (1963)
An Experimental Application of the Delphi Method to the Use of ExpertsManagement Science, 9
V. Ravi, R. Shankar (2005)
ANALYSIS OF INTERACTIONS AMONG THE BARRIERS OF REVERSE LOGISTICSTechnological Forecasting and Social Change, 72
Fernando Polónia, Filipe Sá-Soares (2013)
Key Issues in Information Systems Security Management, 3
S. Sharkey, Anne Sharples (2001)
An approach to consensus building using the Delphi technique: developing a learning resource in mental health.Nurse education today, 21 5
Murat Dogrul, Adile Aslan, Eyyup Celik (2011)
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism2011 3rd International Conference on Cyber Conflict
G. Rowe, George Wright (1999)
The Delphi technique as a forecasting tool: issues and analysisInternational Journal of Forecasting, 15
A. Mandal, S. Deshmukh (1994)
Vendor Selection Using Interpretive Structural Modelling (ISM)International Journal of Operations & Production Management, 14
M. Turoff (1970)
The design of a policy DelphiTechnological Forecasting and Social Change, 2
J. Torres, J. Sarriegi, J. Hernantes, A. Laugé (2009)
Steering Security through Measurement
M. Gerber, R. Solms (2008)
Information security requirements - Interpreting the legal aspectsComput. Secur., 27
Nick Catrantzos (2010)
No Dark Corners: A Different Answer to Insider ThreatsHomeland Security Affairs, 6
Sushil (2005)
INTERPRETIVE MATRIX: A TOOL TO AID INTERPRETATION OF MANAGEMENT AND SOCIAL RESEARCH, 6
S. Goel, I. Chengalur-Smith (2010)
Metrics for characterizing the form of security policiesJ. Strateg. Inf. Syst., 19
Huigang Liang, Yajiong Xue (2010)
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance PerspectiveJ. Assoc. Inf. Syst., 11
K. Mccrohan, K. Engel, J. Harvey (2010)
Influence of Awareness and Training on Cyber SecurityJournal of Internet Commerce, 9
(2019)
The Delphi MethodNew Teaching Resources for Management in a Globalised World
J. Navare, O. Gemikonakli (2010)
Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks
S. Keeney, F. Hasson, H. McKenna (2001)
A critical review of the Delphi technique as a research methodology for nursing.International journal of nursing studies, 38 2
G. Kannan, A. Haq (2007)
Analysis of interactions of criteria and sub-criteria for the selection of supplier in the built-in-order supply chain environmentInternational Journal of Production Research, 45
Kenneth Knapp, R. Morris, T. Marshall, T. Byrd (2009)
Information security policy: An organizational-level process modelComput. Secur., 28
W. Hart, D. Malone (1974)
Goal setting for a state environmental agency, 13
S. Furnell, M. Gennatou, P. Dowland (2002)
A prototype tool for information security awareness and trainingLogistics Information Management, 15
A. Nicholson, S. Webber, S. Dyer, T. Patel, H. Janicke (2012)
SCADA security in the light of Cyber-WarfareComput. Secur., 31
Donghee Shin (2010)
A socio-technical framework for cyber-infrastructure designTechnological Forecasting and Social Change, 77
Nigel Martin, J. Rice (2011)
Cybercrime: Understanding and addressing the concerns of stakeholdersComput. Secur., 30
Phil Spurling (1995)
Promoting security awareness and commitmentInf. Manag. Comput. Secur., 3
Robert Hawthorne, A. Sage (1975)
On applications of interpretive structural modeling to higher education program planningSocio-economic Planning Sciences, 9
M. Gupta (2010)
Tracking the Evolution of E-Governance in IndiaInt. J. Electron. Gov. Res., 6
N. You, Y. Kato, M. Kitaoka (1994)
Numerous date in hierarchy for knowledge concentrated in decision tree, 27
Purpose– The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and create a framework of these issues to provide interesting managerial insights about their hierarchy. Current literature advocates relevance of both technical and social issues in a potential framework to address national and organizational information security concerns. Such a framework can guide users in developing insight for strategy in the maize of important information security issues and their intricate interdependency. Design/methodology/approach– Delphi methodology is used to identify a set of topical issues with help from members of a cyber security group. These issues are further analyzed using Interpretive Structural Modeling (ISM) to impose order and direction to the complex relationships among them. Findings– The analysis using ISM creates a framework of these issues and provides interesting managerial insights about their hierarchy. These insights are used to recommend prioritized action for information security at national and organizational levels. Research limitations/implications– The highlight of this research is ingenious deployment of two idea engineering methods in developing interpretable structural model of 25 information security issues. This model provides valuable insights and can guide the policy formulation. This is the key contribution of this paper. It needs hardly any emphasis on the need for continuous search of all technical and social issues and formulating policies and programs using experts” judgment in a rigorous manner. Subsequent research may scale up to the global level for extension and validation by empanelling Delphi experts from nations belonging to different regions. Time-variant analysis can be attempted with the help of System Dynamics Modeling using causal-loop diagrams to account for the supportive and inhibiting influences of various issues. This approach has the potential to generate more realistic insights that can inform policy formulation. Practical implications– It brings about key information security issues connected with its various facets, viz. national/organizational level initiatives, supportive processes, capabilities and objectives. These issues, identified by Indian experts in the Indian context, offer a method that one could apply in other national contexts and see whether substantial differences occur, and how other experts prioritize these issues. The analysis of social issues along with technical issues using the ISM tool provides us insights that are considered applicable to a larger context than India. The policy and program formulations in other nations can benefit from the insights generated by this research. The fast-paced proliferation of technology and its resultant vulnerabilities have given birth to an underground economy of malware trading by criminals, terrorists and hostile nation states. Secure cyber space for legitimate use by the globalized world can only be achieved by international cooperation. Social implications– A “digital divide” in cyber defense cannot be afforded. As explained earlier, cyber security is a challenge for both developed and developing nations. Prioritization of resources in a sequence suggested by ISM analysis would help face the challenge of cyber security better. The methodology suggested in this paper would ensure adequate response to cyber threats and eliminate knee-jerk reaction. Originality/value– This research emphasizes identification of hierarchical relationship among the identified topical issues of information security rather than using them as a flat checklist. It helps us segregate the end objectives from root issues and highlights the necessity of addressing these root issues to achieve those objectives.
Transforming Government People Process and Policy – Emerald Publishing
Published: Aug 12, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.