{"title":"ISMSs In outsourcing Context","authors":"Moneef Almutairi, S. Riddle","doi":"10.1109/NCG.2018.8593122","DOIUrl":null,"url":null,"abstract":"While information systems play a vital role in modern organizations for enhancing their business operations and achieving competitive services, they are vulnerable to insider and outsider security threats such as data loss, viruses and attackers. Many organizations have realized the importance of ISMSs and adopted them to achieve their security goals. Despite the enormous benefit of ISMSs to the achievement of security goals, they are still exposed to different security and compliance challenges and needs in the outsourcing context. In this paper, we review five ISMSs (COBIT, OCTAVE, SSE-CMM, GMITS, and the ISO/IEC 2700x series) in the outsourcing context based on specific criteria. The results of this review, in addition to the strengths and weaknesses of ISMSs, are provided in this paper.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st Saudi Computer Society National Computer Conference (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCG.2018.8593122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
While information systems play a vital role in modern organizations for enhancing their business operations and achieving competitive services, they are vulnerable to insider and outsider security threats such as data loss, viruses and attackers. Many organizations have realized the importance of ISMSs and adopted them to achieve their security goals. Despite the enormous benefit of ISMSs to the achievement of security goals, they are still exposed to different security and compliance challenges and needs in the outsourcing context. In this paper, we review five ISMSs (COBIT, OCTAVE, SSE-CMM, GMITS, and the ISO/IEC 2700x series) in the outsourcing context based on specific criteria. The results of this review, in addition to the strengths and weaknesses of ISMSs, are provided in this paper.