Skip to main content
Top
Published in: Information Systems Frontiers 2/2023

28-02-2022

An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks

Authors: Tejaswini C. Herath, Hemantha S. B. Herath, David Cullum

Published in: Information Systems Frontiers | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As organizations have become increasingly reliant on information systems, senior managers are keen in assessing the progress of implemented information security strategies. Although the balanced scorecard approach has been suggested for security governance, a critical issue affecting information security practitioners is complexity, as there are many standards and frameworks, with duplication and overlaps to adhere to when organizing the data. Consequently, the article attempts to develop a more inclusive framework for information security governance, a research gap recently identified in the literature. The article maps five governance and control frameworks (COBIT, SABSA, ISG, ITIL, and ISO 27000) to the information security balanced scorecard (InfoSec BSC) to develop a conceptual design of an effective information security performance measurement tool that can be used by senior managers. Using a real-life case application and interviews with a panel of experts, the article identifies IS initiatives, performance measures for each of the mapped objectives derived from governance and control frameworks that may provide guidance for practitioners.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
“The current version is COBIT 5, which is the leading business framework for governance and management of enterprise IT (ISACA). COBIT 5 builds on the previous versions of COBIT (and Val IT and Risk IT), and without loss of information in this article, we focus on COBIT 4.1. COBIT 5 goals cascade stakeholder needs into specific actionable and customized goals within the context of enterprise, IT-related goals and enabler goals. The enterprise goals have been developed using the BSC dimensions and the list is not exhaustive (ISACA). COBIT 5 separates IT governance (evaluate stakeholder needs, set direction through prioritization, and monitor performance, compliance, and progress) and IT management (plan, build, run, and monitor activities with direction set by governance).
 
2
We would like to thank the two anonymous reviewers for giving us in-depth feedback on the mappings as well as constructive feedback related to methodology.
 
Literature
go back to reference Ahuja, S., & Chan, Y. E. (2015). IT Security Governance: A Framework based on ISO 38500. In CONF-IRM 2015 Proceedings (Vol. 27, p. 15). Ahuja, S., & Chan, Y. E. (2015). IT Security Governance: A Framework based on ISO 38500. In CONF-IRM 2015 Proceedings (Vol. 27, p. 15).
go back to reference Atkinson, M. (2004). Measuring the performance of the IT function in the UK health service using a balanced scorecard approach. Electronic Journal of Information Systems Evaluation, 1–10. Atkinson, M. (2004). Measuring the performance of the IT function in the UK health service using a balanced scorecard approach. Electronic Journal of Information Systems Evaluation, 1–10.
go back to reference Awadallah, E. A., & Allam, A. (2015). A critique of the balanced scorecard as a performance measurement tool. International Journal of Business and Social Science, 6(7), 91–99. Awadallah, E. A., & Allam, A. (2015). A critique of the balanced scorecard as a performance measurement tool. International Journal of Business and Social Science, 6(7), 91–99.
go back to reference Bailey, E., & Becker, J. D. (2014). A comparison of IT governance and control frameworks in cloud computing (p. 16). Presented at the Twentieth Americas Conference on Information Systems. Bailey, E., & Becker, J. D. (2014). A comparison of IT governance and control frameworks in cloud computing (p. 16). Presented at the Twentieth Americas Conference on Information Systems.
go back to reference Bremser, W. G., & Chung, Q. B. (2005). A framework for performance measurement in the e-business environment. Electronic Commerce Research and Applications, 4(4), 395–412.CrossRef Bremser, W. G., & Chung, Q. B. (2005). A framework for performance measurement in the e-business environment. Electronic Commerce Research and Applications, 4(4), 395–412.CrossRef
go back to reference Brothy, K. (2009). Information security governance: a practical development and implementation approach (Vol. 53). John Wiley & Sons. Brothy, K. (2009). Information security governance: a practical development and implementation approach (Vol. 53). John Wiley & Sons.
go back to reference Butler, J., Henderson, S., & Raiborn, C. (2011). Sustainability and the balanced scorecard: Integrating green measures into business reporting. Management Accounting Quarterly, 12(2), 1–10. Butler, J., Henderson, S., & Raiborn, C. (2011). Sustainability and the balanced scorecard: Integrating green measures into business reporting. Management Accounting Quarterly, 12(2), 1–10.
go back to reference Campara, D., & Mansourov, N. (2008). How to tackle security issues in large existing/legacy systems while maintaining development priorities. In 2008 IEEE Conference on Technologies for Homeland Security (pp. 167–172). Presented at the 2008 IEEE Conference on Technologies for Homeland Security. https://doi.org/10.1109/THS.2008.4534443. Campara, D., & Mansourov, N. (2008). How to tackle security issues in large existing/legacy systems while maintaining development priorities. In 2008 IEEE Conference on Technologies for Homeland Security (pp. 167–172). Presented at the 2008 IEEE Conference on Technologies for Homeland Security. https://​doi.​org/​10.​1109/​THS.​2008.​4534443.
go back to reference Chew, E., Swanson, M. M., Stine, K. M., Bartol, N., Brown, A., & Robinson, W. (2008). Performance measurement guide for information security (800–55, Revision 1 ed.pp. 1–40). National Institute of Standards and Technology.CrossRef Chew, E., Swanson, M. M., Stine, K. M., Bartol, N., Brown, A., & Robinson, W. (2008). Performance measurement guide for information security (800–55, Revision 1 ed.pp. 1–40). National Institute of Standards and Technology.CrossRef
go back to reference Da Cruz, E., & Labuschagne, L. (2005). A new framework for bridging the gap between IT service management and IT governance from a security perspective (pp. 1–12). Academy of Information Technology at the University of Johannesburg. Da Cruz, E., & Labuschagne, L. (2005). A new framework for bridging the gap between IT service management and IT governance from a security perspective (pp. 1–12). Academy of Information Technology at the University of Johannesburg.
go back to reference Garigue, R., & Stefaniu, M. (2003). Information security governance reporting. Information Systems Security Journal, 12(4), 36–40.CrossRef Garigue, R., & Stefaniu, M. (2003). Information security governance reporting. Information Systems Security Journal, 12(4), 36–40.CrossRef
go back to reference Gashgari, G., Walters, R., & Wills, G. (2017). A Proposed Best-practice Framework for Information Security Governance: In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (pp. 295–301). Presented at the 2nd International Conference on Internet of Things, Big Data and Security, SCITEPRESS - Science and Technology Publications. https://doi.org/10.5220/0006303102950301. Gashgari, G., Walters, R., & Wills, G. (2017). A Proposed Best-practice Framework for Information Security Governance: In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (pp. 295–301). Presented at the 2nd International Conference on Internet of Things, Big Data and Security, SCITEPRESS - Science and Technology Publications. https://​doi.​org/​10.​5220/​0006303102950301​.
go back to reference Goldman, J. E., & Ahuja, S. (2011). Integration of COBIT, balanced scorecard and SSE-CMM as an organizational & strategic information security management (ISM) framework. In In ICT ethics and security in the 21st century: New developments and applications (pp. 277–309). IGI Global.CrossRef Goldman, J. E., & Ahuja, S. (2011). Integration of COBIT, balanced scorecard and SSE-CMM as an organizational & strategic information security management (ISM) framework. In In ICT ethics and security in the 21st century: New developments and applications (pp. 277–309). IGI Global.CrossRef
go back to reference Hasan, R., & Chyi, T. (2017). Practical application of balanced scorecard - a literature review. Journal of Strategy and Performance Management, 5, 87–103. Hasan, R., & Chyi, T. (2017). Practical application of balanced scorecard - a literature review. Journal of Strategy and Performance Management, 5, 87–103.
go back to reference Herath, H., Bremser, W., & Birnberg, J. (2019). Team-based employee remuneration: A balanced scorecard group target and weight selection-based bonus allocation. Accounting Research Journal, 32(2), 252–272.CrossRef Herath, H., Bremser, W., & Birnberg, J. (2019). Team-based employee remuneration: A balanced scorecard group target and weight selection-based bonus allocation. Accounting Research Journal, 32(2), 252–272.CrossRef
go back to reference IT Governance Institute. (2006). Information security governance: Guidance for boards of directors and executive management. ISACA. IT Governance Institute. (2006). Information security governance: Guidance for boards of directors and executive management. ISACA.
go back to reference IT Governance Institute (Ed.). (2007). COBIT 4.1: Framework, control objectives, management guidelines, maturity models. IT Governance Institute. IT Governance Institute (Ed.). (2007). COBIT 4.1: Framework, control objectives, management guidelines, maturity models. IT Governance Institute.
go back to reference Kaplan, R. S., & Norton, D. P. (1992). The balanced scorecard: Measures that drive performance. Harvard Business Review, 83, 71–79. Kaplan, R. S., & Norton, D. P. (1992). The balanced scorecard: Measures that drive performance. Harvard Business Review, 83, 71–79.
go back to reference Kaplan, R. S., & Norton, D. P. (2005). The balanced scorecard: Measures that drive performance. Harvard Business Review, 83(7), 172. Kaplan, R. S., & Norton, D. P. (2005). The balanced scorecard: Measures that drive performance. Harvard Business Review, 83(7), 172.
go back to reference Keyes, J. (2016). Chapter 4: Aligning IT to organizational strategy. In Implementing the IT balanced scorecard: Aligning IT with corporate strategy (pp. 91–113). Auerbach Publications, Taylor and Francis Group.CrossRef Keyes, J. (2016). Chapter 4: Aligning IT to organizational strategy. In Implementing the IT balanced scorecard: Aligning IT with corporate strategy (pp. 91–113). Auerbach Publications, Taylor and Francis Group.CrossRef
go back to reference Kong, H.-K., Kim, T.-S., & Kim, J. (2012). An analysis on effects of information security investments: A BSC perspective. Journal of Intelligent Manufacturing, 23(4), 941–953.CrossRef Kong, H.-K., Kim, T.-S., & Kim, J. (2012). An analysis on effects of information security investments: A BSC perspective. Journal of Intelligent Manufacturing, 23(4), 941–953.CrossRef
go back to reference Krumay, B., Bernroider, E. W. N., & Walser, R. (2018). Evaluation of cybersecurity management controls and metrics of critical infrastructures: A literature review considering the NIST cybersecurity framework. In N. Gruschka (Ed.), Secure IT systems (pp. 369–384). Springer International Publishing. https://doi.org/10.1007/978-3-030-03638-6_23CrossRef Krumay, B., Bernroider, E. W. N., & Walser, R. (2018). Evaluation of cybersecurity management controls and metrics of critical infrastructures: A literature review considering the NIST cybersecurity framework. In N. Gruschka (Ed.), Secure IT systems (pp. 369–384). Springer International Publishing. https://​doi.​org/​10.​1007/​978-3-030-03638-6_​23CrossRef
go back to reference Martinsons, M., Davison, R., & Tse, D. (1999). The balanced scorecard: A foundation for the strategic management of information systems. Decision Support Systems, 25(1), 71–88.CrossRef Martinsons, M., Davison, R., & Tse, D. (1999). The balanced scorecard: A foundation for the strategic management of information systems. Decision Support Systems, 25(1), 71–88.CrossRef
go back to reference Matthiesen, S., & Bjørn, P. (2015). Why Replacing Legacy Systems Is So Hard in Global Software Development: An Information Infrastructure Perspective. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 876–890). Presented at the CSCW ‘15: Computer Supported Cooperative Work and Social Computing, Vancouver BC Canada: ACM. https://doi.org/10.1145/2675133.2675232. Matthiesen, S., & Bjørn, P. (2015). Why Replacing Legacy Systems Is So Hard in Global Software Development: An Information Infrastructure Perspective. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 876–890). Presented at the CSCW ‘15: Computer Supported Cooperative Work and Social Computing, Vancouver BC Canada: ACM. https://​doi.​org/​10.​1145/​2675133.​2675232.
go back to reference McHugh, M. L. (2012). Interrater reliability: The kappa statistic. Biochemia Medica, 22(3), 276–282.CrossRef McHugh, M. L. (2012). Interrater reliability: The kappa statistic. Biochemia Medica, 22(3), 276–282.CrossRef
go back to reference de Oliveira Alves, G. A., da Costa Carmo, L. F. R., & de Almeida, A. C. R. D. (2006). Enterprise security governance; a practical guide to implement and control information security governance (ISG). In In 2006 IEEE/IFIP business driven IT management (pp. 71–80). Presented at the 2006 IEEE/IFIP Business Driven IT Management. https://doi.org/10.1109/BDIM.2006.1649213CrossRef de Oliveira Alves, G. A., da Costa Carmo, L. F. R., & de Almeida, A. C. R. D. (2006). Enterprise security governance; a practical guide to implement and control information security governance (ISG). In In 2006 IEEE/IFIP business driven IT management (pp. 71–80). Presented at the 2006 IEEE/IFIP Business Driven IT Management. https://​doi.​org/​10.​1109/​BDIM.​2006.​1649213CrossRef
go back to reference Omoyiola, B. O. (2020). The evolution of information security measurement and testing. IOSR Journal of Computer Engineering, 22(3), 50–54. Omoyiola, B. O. (2020). The evolution of information security measurement and testing. IOSR Journal of Computer Engineering, 22(3), 50–54.
go back to reference Patnayakuni, R., & Patnayakuni, N. (2014). Information Security in Value Chains: A Governance Perspective. Patnayakuni, R., & Patnayakuni, N. (2014). Information Security in Value Chains: A Governance Perspective.
go back to reference Pirttimaki, V., & Lonnqvist, A. (2006). The measurement of business intelligence. Information Systems Management, 231, 32–40. Pirttimaki, V., & Lonnqvist, A. (2006). The measurement of business intelligence. Information Systems Management, 231, 32–40.
go back to reference Pirttimäki, V., Lönnqvist, A., & Karjaluoto, A. (2006). Measurement of business intelligence in a Finnish telecommunications company. The Electronic Journal of Knowledge Management, 4(1), 83–90. Pirttimäki, V., Lönnqvist, A., & Karjaluoto, A. (2006). Measurement of business intelligence in a Finnish telecommunications company. The Electronic Journal of Knowledge Management, 4(1), 83–90.
go back to reference Sarker, S., Xiao, X., & Beaulieu, T. (2013). Qualitative studies in information systems: A critical review and some guiding principles. MIS Quarterly, 37(4), iii–xviii. Sarker, S., Xiao, X., & Beaulieu, T. (2013). Qualitative studies in information systems: A critical review and some guiding principles. MIS Quarterly, 37(4), iii–xviii.
go back to reference Sheikhpour, R., & Modiri, N. (2012). An approach to map COBIT processes to ISO/IEC 27001 information security management controls. International Journal of Security and Its Applications, 6(2), 16. Sheikhpour, R., & Modiri, N. (2012). An approach to map COBIT processes to ISO/IEC 27001 information security management controls. International Journal of Security and Its Applications, 6(2), 16.
go back to reference Sherwood, J., Clark, A., & Lynas, D. (1995). Enterprise security architecture. SABSA, White paper, 2009. Sherwood, J., Clark, A., & Lynas, D. (1995). Enterprise security architecture. SABSA, White paper, 2009.
go back to reference Shih-Jen, K. H., & McKay, R. (2002). Balanced scorecard: Two perspectives: Certified public accountant. The CPA Journal, 72(3), 20. Shih-Jen, K. H., & McKay, R. (2002). Balanced scorecard: Two perspectives: Certified public accountant. The CPA Journal, 72(3), 20.
go back to reference Shivashankarappa, A. N., Smalov, L., Dharmalingam, R., & Anbazhagan, N. (2012). Implementing it governance using COBIT: A case study focusing on critical success factors. In In world congress on internet security (WorldCIS-2012) (pp. 144–149). Presented at the World Congress on Internet Security (WorldCIS-2012). Shivashankarappa, A. N., Smalov, L., Dharmalingam, R., & Anbazhagan, N. (2012). Implementing it governance using COBIT: A case study focusing on critical success factors. In In world congress on internet security (WorldCIS-2012) (pp. 144–149). Presented at the World Congress on Internet Security (WorldCIS-2012).
go back to reference Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security, 2(1), 14–20. Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security, 2(1), 14–20.
go back to reference Tallau, L. J., Gupta, M., & Sharman, R. (2010). Information security investment decisions: Evaluating the balanced scorecard method. International Journal of Business Information Systems, 5(1), 34–57.CrossRef Tallau, L. J., Gupta, M., & Sharman, R. (2010). Information security investment decisions: Evaluating the balanced scorecard method. International Journal of Business Information Systems, 5(1), 34–57.CrossRef
go back to reference Van Grembergen, W., & De Haes, S. (2005). Measuring and improving IT governance through the balanced scorecard. Information Systems Control Journal, 2(1), 35–42. Van Grembergen, W., & De Haes, S. (2005). Measuring and improving IT governance through the balanced scorecard. Information Systems Control Journal, 2(1), 35–42.
go back to reference Veiga, AD., Eloff, JH. (2007). An information security governance framework. Information systems management, 24(4):361–372. Veiga, AD., Eloff, JH. (2007). An information security governance framework. Information systems management, 24(4):361–372.
go back to reference Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Cengage Learning. Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Cengage Learning.
go back to reference Whitman, M., & Mattord, H. J. (2014). Information security governance for the non-security business executive. Journal of Executive Education, 11(1), 17. Whitman, M., & Mattord, H. J. (2014). Information security governance for the non-security business executive. Journal of Executive Education, 11(1), 17.
go back to reference Williams, P. (2006). The role of standards in medical information. Security Management, 415–420. Williams, P. (2006). The role of standards in medical information. Security Management, 415–420.
go back to reference Woudenberg, F. (1991). An evaluation of Delphi. Technological Forecasting and Social Change, 40(2), 131–150.CrossRef Woudenberg, F. (1991). An evaluation of Delphi. Technological Forecasting and Social Change, 40(2), 131–150.CrossRef
Metadata
Title
An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks
Authors
Tejaswini C. Herath
Hemantha S. B. Herath
David Cullum
Publication date
28-02-2022
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 2/2023
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-022-10246-9

Other articles of this Issue 2/2023

Information Systems Frontiers 2/2023 Go to the issue

Premium Partner