loading
Papers Papers/2020

Research.Publish.Connect.

Paper

Authors: Michelle McClintock ; Katrina Falkner ; Claudia Szabo and Yuval Yarom

Affiliation: School of Computer Science, University of Adelaide, North Terrace, Adelaide, Australia

Keyword(s): Information Systems Security Policy, Enterprise Architecture, Design Science Research, Grounded Method, Business Process Modelling.

Abstract: Security has never been more important. However, without a holistic security structure that secures all assets of an organisation (physical, digital or cognitive), an organisation is at a critical risk. Enterprise architecture (EA) applies engineering design principles and provides a complete structure to design and build an organisation using classification schema and descriptive representations. The grouping of security with EA, through a framework with corresponding security classifications and representations, promises a complete security solution. We evaluate security frameworks and find that grouping security with EA is not new, however current solutions indicate a lack of research process in development, a disjoint focus in either technical or policy / department or project. Thus, there is a need for a holistic solution. We use a Design Science Research methodology to design, develop, and demonstrate a security EA framework that provides an organisation with a complete securit y solution regardless of industry, budgetary constraints, or size, and survey professionals to critically analyse the framework. The results indicate the need for a complete security structure including benefits in governance, resourcing, functional responsibilities, risk management and compliance. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.234.211.61

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
McClintock, M.; Falkner, K.; Szabo, C. and Yarom, Y. (2020). Enterprise Security Architecture: Mythology or Methodology?. In Proceedings of the 22nd International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-423-7; ISSN 2184-4992, pages 679-689. DOI: 10.5220/0009404406790689

@conference{iceis20,
author={Michelle McClintock. and Katrina Falkner. and Claudia Szabo. and Yuval Yarom.},
title={Enterprise Security Architecture: Mythology or Methodology?},
booktitle={Proceedings of the 22nd International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2020},
pages={679-689},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0009404406790689},
isbn={978-989-758-423-7},
issn={2184-4992},
}

TY - CONF

JO - Proceedings of the 22nd International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - Enterprise Security Architecture: Mythology or Methodology?
SN - 978-989-758-423-7
IS - 2184-4992
AU - McClintock, M.
AU - Falkner, K.
AU - Szabo, C.
AU - Yarom, Y.
PY - 2020
SP - 679
EP - 689
DO - 10.5220/0009404406790689

0123movie.net