A model to measure the maturity of smartphone security at software consultancies
نویسندگان
چکیده
Smartphones are proliferating into the workplace at an ever-increasing rate. Similarly the information security threats that they pose are increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. The risks introduced by smartphones are analysed through multiple cases studies, and a maturity measurement model is formulated. This model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of Smartphone specific risks are integrated with key control recommendations to provide a set of key measurable security maturity components. The empirical evidence is gathered using an in-depth questionnaire of 67 question statements adapted from each of the activities recommended by the COBIT 4.1 processes which target risk management as a primary objective. The opinions of 58 respondents are included as key components in the model. The solution addresses the concerns of not only policy makers, but also the employees subjected to security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research paper. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphones. In addition, the critical components of a Smartphone security solution are identified. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model is applicable to any information intensive organisation.
منابع مشابه
Hunting for Aardvarks: Can Software Security Be Measured?
When you are in charge of building software from the ground up, software security can be encouraged through the use of secure software development methodologies. However, how can you measure the security of a given piece of software that you didn’t write yourself? In other words, when looking at two executables, what does “a is more secure than b” mean? This paper examines some approaches to me...
متن کاملDeveloping a Smartphone-Based Educational Application for Women at Risk of Endometriosis
Introduction: Since endometriosis is a chronic disease and requires long-term care, it can have a devastating effect on life quality. For this reason, it is necessary to increase awareness and educate women about endometriosis. In this regard, a mobile phone-based endometriosis training program was designed. Method: The present paper is a development-applied study and was conducted in two stage...
متن کاملMEASURING SOFTWARE PROCESSES PERFORMANCE BASED ON FUZZY MULTI AGENT MEASUREMENTS
The present article discusses and presents a new and comprehensive approachaimed at measuring the maturity and quality of software processes. This method has beendesigned on the basis of the Software Capability Maturity Model (SW-CMM) and theMulti-level Fuzzy Inference Model and is used as a measurement and analysis tool. Among themost important characteristics of this method one can mention si...
متن کاملIdentifying Educational Contents and Technical Features of a Self-Management Smartphone Application for Women with Breast Cancer
Background and Objective: Breast cancer patients need a variety of skills and abilities to deal with the consequences of the illness. Self-management is one of the operational strategies that leads to disease acceptance, treatment adherence, and improving the quality of life. The use of smartphone applications (apps) can play a pivotal role in the support and self-management of breast cancer pa...
متن کاملIdentifying the Challenges of the Blockchain Technology Maturity Model in Health-Oriented Organizations
Introduction: Blockchain is a widely used technology in the health area; however, it also comes with challenges. By identifying these challenges, the road to blockchain maturity can be made smoother in this field. This study aimed to identify the challenges of the blockchain technology maturity model in health-oriented organizations. Method: In this phenomenological qualitative study, experts i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010