"Development of methods for identifying an appropriate benchmarking pee" by Martin Kang, Anat Hovav et al.
 

Development of methods for identifying an appropriate benchmarking peer to establish information security policy

Abstract

Benchmarking methodology provides organizations with appropriate information security policy. However, selecting an appropriate organization as a benchmarking peer can be a challenge due to firms’ heterogeneous implementation and usage of information systems. Our goal is to develop and propose methods to appropriately identify a benchmarking peer organization by incorporating machine learning methods and mathematics set theory. We incorporate vague soft set, entropy, dynamic time warping, and Gaussian process. We use log data from information security management systems in multiple companies to validate our methods. Our experimental results indicate that the combined use of Gaussian process, vague soft set, and dynamic time warping can be more effective in identifying an appropriate benchmarking peer than conventional machine learning methods.

Publication Title

Expert Systems with Applications

Plum Print visual indicator of research metrics
PlumX Metrics
  • Citations
    • Citation Indexes: 6
  • Usage
    • Abstract Views: 1
  • Captures
    • Readers: 28
  • Social Media
    • Shares, Likes & Comments: 49
see details

Share

COinS