Browse by author
Lookup NU author(s): Moneef Almutairi,
Dr Stephen RiddleORCiD
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
© 2018 IEEE. While information systems play a vital role in modern organizations for enhancing their business operations and achieving competitive services, they are vulnerable to insider and outsider security threats such as data loss, viruses and attackers. Many organizations have realized the importance of ISMSs and adopted them to achieve their security goals. Despite the enormous benefit of ISMSs to the achievement of security goals, they are still exposed to different security and compliance challenges and needs in the outsourcing context. In this paper, we review five ISMSs (COBIT, OCTAVE, SSE-CMM, GMITS, and the ISO/IEC 2700x series) in the outsourcing context based on specific criteria. The results of this review, in addition to the strengths and weaknesses of ISMSs, are provided in this paper.
Author(s): Almutairi M, Riddle S
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: 2018 21st Saudi Computer Society National Computer Conference (NCC)
Year of Conference: 2018
Online publication date: 31/12/2018
Acceptance date: 02/04/2018
Library holdings: Search Newcastle University Library for this item