Abstract
Prominent standards and frameworks for information security clearly state that business aspects on the one side, and technical aspects on the other, are equally important for the management of cyber security. Organisations with a relatively low maturity level in security management typically consider information security primarily as a technological issue. For those organisations, information security might not get the necessary support from top-level management because they are predominantly focused on business aspects, and are blind to the role information security plays for business. To obtain support from top-level management the information security practitioners need the skills to influence and help relevant stakeholders to understand how information security can support business objectives. In this debate, it is often argued that it is important to speak the language of management. This means that information security practitioners should learn how to translate technical terms to a business context, so top-level management can understand what it means for them. However, this debate has mostly focused on the importance of speaking the “Business Language for Information Security (BLIS)” but has not elaborated on what this language consists of and how to learn it. This paper proposes BLIS and a framework for how to learn it. By mastering BLIS, security professionals can articulate arguments that top-executive management can easily understand and act on. Therefore, we argue that taking a learning module on BLIS will be valuable and useful for the next generation of students in information security. Said briefly, learning BLIS will help students understand how information security can support business, and also how this can be explained to others.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ashenden, D., Sasse, A.: CISOs and organisational culture: their own worst enemy? Comput. Secur. 39, 396–405 (2013)
Kolomiets, S., Konoplenko, L.: A model for teaching speaking English for specificpurposes (information security) using business game. Adv. Educ. 3, 58–63 (2015)
Drevin, L., Kruger, H., Bell, A.-M., Steyn, T.: A linguistic approach to information security awareness education in a healthcare environment. In: Bishop, M., Futcher, L., Miloslavskaya, N., Theocharidou, M. (eds.) WISE 2017. IAICT, vol. 503, pp. 87–97. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58553-6_8
Alotaibi, Y.: A secure business process modelling for better alignment between business and IT. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 4793–4802 (2016)
Brucker, A.: Integrating security aspects into business process models. It–Inf. Technol. 55, 239–246 (2013)
Altuhhova, O., Matulevičius, R., Ahmed, N.: Towards definition of secure business processes. In: Bajec, M., Eder, J. (eds.) CAiSE 2012. LNBIP, vol. 112, pp. 1–15. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31069-0_1
Schinagl, S., Paans, R.: Communication barriers in the decision-making process: system language and system thinking. In: Proceedings of The 50th Hawaii International Conference On System Sciences (2017)
Abbass, W., Baina, A., Bellafkih, M.: Improvement of information system security risk management. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 182–187 (2016)
Sechi, F., Gran, B., Jørgensen, P., Kilyukh, O.: Better security assessment communication: combining ISO 27002 controls with UML sequence diagrams. In: 2022 IEEE/ACM 3rd International Workshop On Engineering and Cybersecurity of Critical Systems (EnCyCriS), pp. 49–56 (2022)
F Moyón D Méndez K Beckers S Klepper 2021 Using process models to understand security standards T Bureš Eds et al SOFSEM 2021: Theory and Practice of Computer Science SOFSEM 2021 47th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2021, Bolzano-Bozen, Italy, January 25–29, 2021, Proceedings Bolzano-Bozen Italy 2021 01 25 2021 01 29 Lecture Notes in Computer Science LNCS 12607 Springer Cham 458 471 https://doi.org/10.1007/978-3-030-67731-2_34
Rainer, R., Jr., Marshall, T., Knapp, K., Montgomery, G.: Do information security professionals and business managers view information security issues differently? Inf. Syst. Secur. 16, 100–108 (2007)
Whitman, M., Mattord, H.: Information security governance for the non-security business executive (2014)
Karanja, E.: The role of the chief information security officer in the management of IT security. Inf. Comput. Secur. 25, 300–329 (2017)
Jirasek, V.: Practical application of information security models. Inf. Secur. Tech. Rep. 17, 1–8 (2012)
Ashenden, D.: Information Security management: a human challenge? Inf. Secur. Tech. Rep. 13, 195–201 (2008)
Soomro, Z., Shah, M., Ahmed, J.: Information security management needs moreholistic approach: a literature review. Int. J. Inf. Manage. 36, 215–225 (2016)
Johnston, A., Warkentin, M., Dennis, A., Siponen, M.: Speak their language: designing effective messages to improve employees’ information security decision making. Decis. Sci. 50, 245–284 (2019)
AlGhamdi, S., Win, K., Vlahu-Gjorgievska, E.: Information security governance challenges and critical success factors: systematic review. Comput. Secur. 99, 102030 (2020)
Anu, V.: Information security governance metrics: a survey and taxonomy. Inf. Secur. J. Global Perspect. 31, 466–478 (2022)
Fitzgerald, T.: Clarifying the roles of information security: 13 questions the CEO, CIO, and CISO must ask each other. Inf. Syst. Secur. 16, 257–263 (2007)
Whitten, D.: The chief information security officer: an analysis of the skills required for success. J. Comput. Inf. Syst. 48, 15–19 (2008)
Harkins, M.: The 21st Century CISO. Managing Risk and Information Security, pp. 139–153 (2016)
Hooper, V., McKissack, J.: The emerging role of the CISO. Bus. Horiz. 59, 585–591 (2016)
Kayworth, T., Whitten, D.: Effective information security requires a balance of social and technology factors. MIS Q. Exec. 9, 2012–2052 (2010)
Posthumus, S., Von Solms, R.: A framework for the governance of information security. Comput. Secur. 23, 638–646 (2004)
Solms, S., Solms, R.: Information Security Governance. Springer, New York (2008). https://doi.org/10.1007/978-0-387-79984-1
Mintzberg, H.: Managerial work: analysis from observation. Manage. Sci. 18, B97–B110 (1971)
Hersey, P., Blanchard, K., Natemeyer, W.: situational leadership, perception, and the impact of power. Group Organ. Stud. 4, 418–428 (1979)
Mills, J., Bonner, A., Francis, K.: The development of constructivist grounded theory. Int J Qual Methods 5, 25–35 (2006)
Kitchenham, B.: Procedures for performing systematic reviews. Keele, UK, Keele Univ. 33, 1–26 (2004)
Tran, D., Jøsang, A.: Information security posture to organize and communicate the information security governance program. In: Proceedings of the 18th European Conference on Management Leadership And Governance, ECMLG 2022, vol. 18, pp.515–522 (2022)
Crang, M., Cook, I., et al.: Doing Ethnographies. Sage, Thousand Oaks (2007)
Glaser, B.: Basics of Grounded Theory Analysis: Emergence vs Forcing. Sociology press, London (1992)
Strauss, A., Corbin, J.: Basics of Qualitative Research Techniques. Citeseer (1998)
Standardization, I.: Information security, cybersecurity and privacy protection —Information security management systems—Requirements (2022)
Helse, D.: Overordnet risiko- og s˚arbarhetsvurdering for IKT i helse- og omsorgssektoren (2019)
Regjeringen Nasjonal strategi for digital sikkerhet (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 IFIP International Federation for Information Processing
About this paper
Cite this paper
Tran, D.U., Jøsang, A. (2023). Business Language for Information Security. In: Furnell, S., Clarke, N. (eds) Human Aspects of Information Security and Assurance. HAISA 2023. IFIP Advances in Information and Communication Technology, vol 674. Springer, Cham. https://doi.org/10.1007/978-3-031-38530-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-38530-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-38529-2
Online ISBN: 978-3-031-38530-8
eBook Packages: Computer ScienceComputer Science (R0)