Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    Generative Control Theory for Information Security

    Access Status
    Fulltext not available
    Authors
    Raymond, B.
    Baskerville, Richard
    Date
    2014
    Type
    Journal Article
    
    Metadata
    Show full item record
    Citation
    Raymond, B. and Baskerville, R. 2014. Generative Control Theory for Information Security. Journal of Information System Security. 10 (1): pp. 41-77.
    Source Title
    Journal of Information System Security
    Additional URLs
    http://www.jissec.org/Contents/V10/N1/jissec-v10n1-raymond-p41-ci/?searchterm=Generative Control Theory for Information Security
    http://www.jissec.org/
    ISSN
    1551-0123
    School
    School of Information Systems
    URI
    http://hdl.handle.net/20.500.11937/11009
    Collection
    • Curtin Research Publications
    Abstract

    Increasing information security losses, coupled with more closely regulated security risk disclosure, are raising the importance of information security standards for identifying control gaps and for implementing appropriate and effective information security controls. Despite the growing importance and variety of information security standards, and the large amount of resources involved in their adoption, there remains a lack of theoretical development in this area. The objective of this paper is to develop a better understanding of information security controls defined in standards, by analyzing and comparing their control sets. Our analysis of control sets in two prominent information security standards led to the discovery of a new class of controls - generative controls – which was not previously recognized in the information security literature, and also to the proposition of a new classification scheme with simple metrics for analyzing control sets in standards. This discovery serves as a building block for the proposition of a new theory called ‘generative control theory’ (GCT) for information security. This theory, together with its underlying concepts, explain how the presence of generative controls defined in standards allows them to be applicable to a large number of widely differing organizations, and thereby assures the implementation of appropriate and effective information security controls in those organizations. It also explains the implications of the presence of generative controls in standards for practitioners, researchers and compliance auditors. For example, generative controls present a higher risk of creative compliance. Finally, this study provides recommendations regarding the design, implementation and audit of controls as defined in standards.

    Related items

    Showing items related by title, author, creator and subject.

    • Maritime Supply Chain Security in the Indo-Pacific Region: Threats and Policy Implications for National Security and Resilience
      Nguyen, Hong-Oanh; Van Balen, Michael; Ingram, Aaron; Hurd, Stephen; Chheetri, Prem; Thai, Vinh; Warren, Matthew; Booi, Kam; Oloruntoba, Richard (2022)
      By volume, about 99% of Australia’s trade is carried by sea mainly through the Indo-Pacific region. Australia currently imports 90% of liquid fuel from other countries, primarily Japan, Korea and Singapore. Global shipping ...
    • An analysis of Australian mutual fund performance and market relationships
      Pojanavatee, Sasipa (2013)
      Mutual funds are emerging as an opportunity for investors to automatically diversify their investments in such a way that all their money is pooled and the investment decisions are left to a professional manager. There ...
    • Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
      Anderson, C.; Baskerville, Richard; Kaul, M. (2017)
      Copyright © Taylor & Francis Group, LLC. Contemporary organizations operate in highly interconnected environments where they are frequently confronted by the challenge of balancing the protection of information resources ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.