To read this content please select one of the options below:

Security mistakes in information system deployment projects

Teodor Sommestad (Industrial Information & Control System, Royal Institute of Technology, Stockholm, Sweden)
Mathias Ekstedt (Industrial Information & Control System, Royal Institute of Technology, Stockholm, Sweden)
Hannes Holm (Industrial Information & Control System, Royal Institute of Technology, Stockholm, Sweden)
Muhammad Afzal (Industrial Information & Control System, Royal Institute of Technology, Stockholm, Sweden)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 7 June 2011

3974

Abstract

Purpose

This paper aims to assess the influence of a set of human and organizational factors in information system deployments on the probability that a number of security‐related mistakes are in the deployment.

Design/methodology/approach

A Bayesian network (BN) is created and analyzed over the relationship between mistakes and causes. The BN is created by eliciting qualitative and quantitative data from experts of industrial control system deployments in the critical infrastructure domain.

Findings

The data collected in this study show that domain experts have a shared perception of how strong the influence of human and organizational factors are. According to domain experts, this influence is strong. This study also finds that security flaws are common in industrial control systems operating critical infrastructure.

Research limitations/implications

The model presented in this study is created with the help of a number of domain experts. While they agree on qualitative structure and quantitative parameters, future work should assure that their opinion is generally accurate.

Practical implications

The influence of a set of important variables related to organizational/human aspects on information security flaws is presented.

Social implications

The context of this study is deployments of systems that operate nations' critical infrastructure. The findings suggest that initiatives to secure such infrastructures should not be purely technical.

Originality/value

Previous studies have focused on either the causes of security flaws or the actual flaws that can exist in installed information systems. However, little research has been spent on the relationship between them. The model presented in this paper quantifies such relationships.

Keywords

Citation

Sommestad, T., Ekstedt, M., Holm, H. and Afzal, M. (2011), "Security mistakes in information system deployment projects", Information Management & Computer Security, Vol. 19 No. 2, pp. 80-94. https://doi.org/10.1108/09685221111143033

Publisher

:

Emerald Group Publishing Limited

Copyright © 2011, Emerald Group Publishing Limited

Related articles