comments on "the insider threat to information systems and the effectiveness of iso17799"...
TRANSCRIPT
![Page 1: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos](https://reader036.vdocument.in/reader036/viewer/2022082713/5697c0021a28abf838cc3083/html5/thumbnails/1.jpg)
Comments on "The insider threat to information systems and the effectiveness of ISO17799"
Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos Kiountouzis. "The insider threat to information systems and the effectiveness of ISO17799." Computers & Security 24, no.6 (2005): 472-484.
Ben Skudder
![Page 2: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos](https://reader036.vdocument.in/reader036/viewer/2022082713/5697c0021a28abf838cc3083/html5/thumbnails/2.jpg)
Summary
This paper explores the deficiencies of ISO17799 in addressing insider threats to information systems with reference to modern criminology models.
![Page 3: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos](https://reader036.vdocument.in/reader036/viewer/2022082713/5697c0021a28abf838cc3083/html5/thumbnails/3.jpg)
Appreciation
• What is the significance of this to computer security specialists?
• Given its popularity a computer security specialist is likely to be working under a standard like this.
• It's an area which has a large impact on computer security.
![Page 4: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos](https://reader036.vdocument.in/reader036/viewer/2022082713/5697c0021a28abf838cc3083/html5/thumbnails/4.jpg)
Criticism
How can aspects of these models be realised, and how do they relate to the models? With regards to Social Bond Theory:
“the need for management to act as a role model” and its relationship to attachment
commitment and the company “honoring its part of the contract”
Informal controls and their relationship to Social Bond Theory, Social Learning Theory and the Theory of Planned Behaviour.
If these enhancements are supposed to be incorporated into a standard there needs to be a criteria by which we can evaluate a given policy.
![Page 5: Comments on "The insider threat to information systems and the effectiveness of ISO17799" Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda and Evangelos](https://reader036.vdocument.in/reader036/viewer/2022082713/5697c0021a28abf838cc3083/html5/thumbnails/5.jpg)
Question
As computer security specialists, to what extent do we need to be aware of security as a social/behavioural problem, either with regards to insider threat in particular or computer security in general?