Identifying the Business Value of Information Security

2014 ◽  
pp. 1056-1079
Author(s):  
Lucas Cardholm

Management may see information security as an inhibitor to daily operations if the investment is not well aligned with current business activities or is presented in financial terms not relevant to their agenda. While this chapter shows that information security improvements create bottom-line business benefits, there is still a need for security managers to focus on quantifying those benefits in relevant financial terms. The purpose is to demystify the principles of general investment processes and criteria for calculating the benefits and costs of investments while accentuating alignment to the imperatives of the organization that makes the investment. As information security investments are assessed alongside other investment projects, it helps to consider them on an equal footing, implying the use of similar, and ideally the same, methods of financial cost projection. It is equally important to position and present the proposed investment in a relevant business context.

Author(s):  
Lucas Cardholm

Management may see information security as an inhibitor to daily operations if the investment is not well aligned with current business activities or is presented in financial terms not relevant to their agenda. While this chapter shows that information security improvements create bottom-line business benefits, there is still a need for security managers to focus on quantifying those benefits in relevant financial terms. The purpose is to demystify the principles of general investment processes and criteria for calculating the benefits and costs of investments while accentuating alignment to the imperatives of the organization that makes the investment. As information security investments are assessed alongside other investment projects, it helps to consider them on an equal footing, implying the use of similar, and ideally the same, methods of financial cost projection. It is equally important to position and present the proposed investment in a relevant business context.


2016 ◽  
Vol 7 (3) ◽  
pp. 1-25
Author(s):  
Lucas Cardholm

Management may see security as an inhibitor to the daily operations if the investment is not well aligned with current business activities or is presented in financial terms not relevant to their agenda. While this article shows that security improvements create bottom-line business benefits, there is still a need for security managers to focus on quantifying those benefits in relevant financial terms. The purpose is to demystify the principles of general investment processes and criteria for calculating the benefits and costs of investments while accentuating alignment to the imperatives of the organization that makes the investment. When security investments are assessed alongside other investment projects it helps to consider them on an equal footing, implying the use of similar, and ideally the same, methods of financial cost projection. It is equally important to position and present the proposed investment in a relevant business context.


Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


2011 ◽  
Vol 13 (1) ◽  
Author(s):  
Tiko Iyamu

Over the last two decades competition amongst organisations including financial institutions has increased tremendously. The value of information is critical to competition in different organisations. In addition, the management of cost of delivery and cohesiveness of information flow and use in the organisations continue a challenge to information technology (IT). In an attempt to address these challenges, many organisations sought various solutions, including enterprise information architecture (EIA). The EIA is intended to address the needs of the organisation for competitive advantage.This research article focused on the role of principles in the development and implementation of EIA. The article aimed to investigate how EIA could be best leveraged, exploited, or otherwise used to provide business value. The research brings about a fresh perspective and new methodological principles required in architecting the enterprise information.


Sign in / Sign up

Export Citation Format

Share Document