Abstract

In the information era, information security monitoring tools would be helpful for enterprises/organizations to monitor employees’ computer usage behaviors and improve their information security protection. The Windows-based operating systems have the largest market share in the world. Therefore, the study target is the development of a Windows-based information security monitoring tool in this study. We proposed an assessment model for developing an information security tool in this study to explore the significances of functionalities in a Windows-based information security monitoring tool and the decision-makers’ decision opinions. We adopted four steps with four study methods: the literature study method, the Delphi method, the analytic hierarchy process (AHP) method, and the analysis methods related to data-driven decision-making in the proposed model. In Step 1, we studied some literature about information security monitoring, and we discovered 26 functionalities as the decision criteria in this study. In Step 2, using the Delphi method, we confirmed the decision criterion set with potential decision-makers and organized the decision criteria hierarchy. In Step 3, we designed an AHP questionnaire to get the criterion weight vectors from the 12 decision-makers. With the AHP method, this study received the weights of the decision criteria and found that the 16 functionalities among the 26 functionalities should receive their corresponding developing priority in a Windows-based information security monitoring tool. Finally, we used the Pearson correlation coefficient and cosine distance to explore the correlations and similarities among the decision-makers’ decision opinions. This study found the relevance among the decision-makers’ decision opinions in a Windows-based information security monitoring tool developed with the Pearson correlation coefficients/the cosine distances among all pairs of decision-makers’ decision opinions.

Highlights

  • This study found that the Windows-based information security monitoring tool should implement twenty-six critical monitoring functions to monitor the computer use behavior of employees in enterprises/organizations

  • The study used the Delphi method to consult several experts/potential decisionmakers on 26 monitoring functions in a literature survey to see if they could become a set of decision criteria in the proposed assessment model

  • This study identified that the Windows-based information security monitoring tool should cover the five main functions, “computer basic information”, “user’s personal computer (PC) operation behavior”, “information security control”, “network behavior”, and “printing control”

Read more

Summary

Introduction

With the advancement of information technology, enterprises/organizations widely use information software and hardware, and the resulting information security issues are getting worse. Enterprises/organizations control their information security risks and ensure continued operations with information security policy formulations and relevant management measure implementations. An enterprise/organization expects to reduce the occurrence of an information security incident, and it will depend on the effective operations of its information security management mechanism to appropriately reduce the incidence of related information security violations.

Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call