Economic Valuation for Information Security Investment: A Systematic Literature Review
Article
Schatz, Daniel and Bashroush, R. 2016. Economic Valuation for Information Security Investment: A Systematic Literature Review. Information Systems Frontiers. 19 (5), pp. 1205-1228. https://doi.org/10.1007/s10796-016-9648-8
Authors | Schatz, Daniel and Bashroush, R. |
---|---|
Abstract | Research on technological aspects of information security risk is a well-established area and familiar territory for most information security professionals. The same cannot be said about the economic value of information security investments in organisations. While there is an emerging research base investigating suitable approaches measuring the value of investments in information security, it remains difficult for practitioners to identify key approaches in current research. To address this issue, we conducted a systematic literature review on approaches used to evaluate investments in information security. Following a defined review protocol, we searched several databases for relevant primary studies and extracted key details from the identified studies to answer our research questions. The contributions of this work include: a comparison framework and a catalogue of existing approaches and trends that would help researchers and practitioners navigate existing work; categorisation and mapping of approaches according to their key elements and components; and a summary of key challenges and benefits of existing work, which should help focus future research efforts. |
Keywords | Information Security; Information Systems; Systematic Literature Review |
Journal | Information Systems Frontiers |
Journal citation | 19 (5), pp. 1205-1228 |
Year | 2016 |
Publisher | Springer |
Accepted author manuscript | License |
Digital Object Identifier (DOI) | https://doi.org/10.1007/s10796-016-9648-8 |
Publication dates | |
18 Apr 2016 | |
Publication process dates | |
Deposited | 25 Apr 2016 |
Accepted | 01 Apr 2016 |
Copyright information | This is a post-peer-review, pre-copyedit version of an article published in Information Systems Frontiers. The final authenticated version is available online at: http://dx.doi.org/10.1007/s10796-016-9648-8 |
https://repository.uel.ac.uk/item/8516q
Download files
Accepted author manuscript
manuscript.pdf | ||
License: Springer Nature Terms of Use for accepted manuscripts of subscription articles, books and chapters |
364
total views1622
total downloads0
views this month0
downloads this month