Using Galois lattice to represent and analyze information security policy compliance

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Employees' noncompliance with the information security policy results in a large number of information security incidents in organizations. The information security managers need to understand and manage the noncompliance behaviors of employees. The representation and pattern of the information security noncompliance or compliance will help managers to gain insights on, and to counter effectively the threats originated from the employees. This study proposes a Compliance Galois Lattice Diagram (CGLD) for visually representing and analyzing the employees' compliance patterns. Six compliance patterns, namely, compliance outlier, compliance core and peripheral, compliance subgroup, compliance partition, multiple compliance containment and compliance equivalence, have been obtained from the CGLD. A comparative analysis of these patterns and the structural features identified from the network generated by the UCINET software reveals that fairly good consistency has been reached between them.

Cite

CITATION STYLE

APA

Wang, X. L., & Li, W. L. (2014). Using Galois lattice to represent and analyze information security policy compliance. In Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation, IEMI 2014 (pp. 353–358). Atlantis Press. https://doi.org/10.2991/978-94-6239-100-0_65

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free