6533b821fe1ef96bd127ba93
RESEARCH PRODUCT
Managing information security risks during new technology adoption
Jose J. GonzalezYulin FangYing Qiansubject
General Computer Sciencedelaybusiness.industryinformation security managementVDP::Technology: 500::Information and communication technology: 550Context (language use)Information securityIntegrated operationsComputer securitycomputer.software_genreProblem managementreactive investmentInformation security managementRisk analysis (engineering)Information and Communications Technologyproactive investmentsystem dynamicsintegrated operationsbusinessLawcomputerRisk managementVulnerability (computing)description
Author's version of an article in the journal: Computers and Security. Also available from the publisher at: http://dx.doi.org/10.1016/j.cose.2012.09.001 In the present study, we draw on previous system dynamics research on operational transition and change of vulnerability to investigate the role of incident response capability in controlling the severity of incidents during the adoption of new technology. Toward this end, we build a system dynamics model using the Norwegian Oil and Gas Industry as the context. The Norwegian Oil and Gas Industry has started to adopt new information communication technology to connect its offshore platforms, onshore control centers, and suppliers. In oil companies, the management is generally aware of the increasing risks associated with operational transition; however, to date, investment in incident response capability has not been highly prioritized because of the uncertainty related to risks and the present reactive mental model of security risk management. The model simulation shows that a reactive approach to security risk management might trap the organization into blindness to minor incidents and low incident response capability, which can lead to severe incidents. The system dynamics model can serve as a means to promote proactive investment in incident response capability.
year | journal | country | edition | language |
---|---|---|---|---|
2012-11-01 | Computers & Security |