Complexity is dead, long live complexity! How software can help service providers manage security and compliance
نویسندگان
چکیده
Service providers expected to see a simplification regarding security and compliance management as standards and best practice were applied to complex information technology (IT) outsourcing arrangements. However, security and compliance management became even more complex and is presenting greater challenges to service providers than ever before. In this article, we focus on the work practices of service providers dealing with complex and transitory security requirements and distributed IT infrastructures. Based on the results of semi-structured interviews followed by a think-aloud study, we first describe specific requirements to be met by software supporting security and compliance management in complex IT outsourcing arrangements, and discuss the extent to which existing software already meets them. We show that existing software, which is primarily designed for in-house settings, fails to meet requirements of complex IT outsourcing arrangements such as (1) the use of standardized and formal descriptions of security requirements and configurations, (2) the definition of a interface allowing to exchange messages and to delegate tasks, (3) the provision of mechanisms for designing and implementing a configuration for specific security requirements across organizational boundaries, (4) the provision of mechanisms for verifying and approving the enforcement of these security requirements, and (5) the provision of mechanisms for searching and browsing security requirements, configurations and links between them. We then propose a software architecture that claims to be capable of meeting those requirements and outline how this claim was evaluated by means of another think-aloud study in which potential end users were asked to perform a series of tasks using a prototypical implementation of the architecture. The results of the evaluation confirm that the software meets the described requirements and suggests that it facilitates the management of security and compliance in complex IT outsourcing arrangements. © 2014 Elsevier Ltd. All rights reserved. 09; fax: þ43 5125072844. ac.at (S. Thalmann), dani k.ac.at (M. Manhart). rved. [email protected] (D. Bachlechner), lukas.demetz@
منابع مشابه
Bridging the ‘Two Cultures’ of Research and Service: Can Complexity Theory Help?; Comment on “Experience of Health Leadership in Partnering With University-Based Researchers in Canada – A Call to ‘Re-imagine’ Research”
This commentary addresses Bowen et al’s empirical study of perspectives of Canadian healthcare staff towards research and their call for multi-faceted action to improve misalignments in the system. This commentary argues that tensions and misalignments between research and service are inherent and can never be eradicated. Building on previous work by Lanham et al, I pro...
متن کاملWeb Service Providers\' Game on Price and Service Level
Response time is one of the critical web service quality dimensions. It refers to how long it takes that a web service responds to request of a user. In order to manage the response time, pricing schemes can work as an efficient access control mechanism. In this paper, we study competition between two providers offering functionally same web services where there is a monopoly service provider...
متن کاملSurvey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks
In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...
متن کامل“HEXAL Model” How It Can Collaborate With Health Service Providers and Travel Medicine
Introduction: Nowadays the trend to travel abroad has extremely grown. This is while, paying attention to travelers’ health is an incredibly important issue. Many organizations try their best to provide health services during travelers’ trips. Meanwhile, the biggest and most effecting health care providers all around the world are hospitals. Regarding this fact, a theory has be...
متن کاملApplying KT Network Complexity to a Highly-Partnered Knowledge Transfer Effort; Comment on “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation”
The re-conceptualization of knowledge translation (KT) in Kitson and colleagues’ manuscript “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation” is an advancement in how one can incorporate implementation into the KT process. Kitson notes that “the challenge is to explain how it might help in the healthcare policy, practice, and research communities.” We propose th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 45 شماره
صفحات -
تاریخ انتشار 2014