Vis enkel innførsel

dc.contributor.authorWangen, Gaute
dc.contributor.authorSnekkenes, Einar
dc.date.accessioned2018-02-12T09:20:51Z
dc.date.available2018-02-12T09:20:51Z
dc.date.created2014-11-10T13:38:49Z
dc.date.issued2014
dc.identifier.isbn978-83-60810-58-3
dc.identifier.urihttp://hdl.handle.net/11250/2483957
dc.description.abstractInformation Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope towards business process security. And rightly so, as introducing an information security control into a business-processing environment is likely to affect business process flow, while redesigning a business process will most certainly have security implications. Hence, in this paper, we investigate the similarities and differences between Business Process Management (BPM) and Information Security Management (ISM), and explore the obstacles and opportunities for integrating the two concepts. We compare three levels of abstraction common for both approaches; top-level implementation strategies, organizational risk views & associated tasks, and domains. With some minor differences, the comparisons shows that there is a strong similarity in the implementation strategies, organizational views and tasks of both methods. The domain comparison shows that ISM maps to the BPM domains; however, some of the BPM domains have only limited support in ISM.nb_NO
dc.language.isoengnb_NO
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)nb_NO
dc.relation.ispartofProceedings of the 2014 Federated Conference on Computer Science and Information Systems
dc.relation.urihttps://fedcsis.org/proceedings/2014/
dc.titleA Comparison between Business Process Management and Information Security Managementnb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber901-910nb_NO
dc.identifier.doi10.15439/2014F77
dc.identifier.cristin1171583
dc.description.localcode© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,18,21,80
cristin.unitnameNorwegian Information Security Lab
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel