Learning from Information Security Maturity: A Textual Analysis
Jackie Rees Ulmer - Purdue University
Jan 14, 2015Size: 598.7MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractThe Building Security in Maturity Model V (BSIMM-V) is an industry-driven maturity model dedicated to software security, which specifies a set of activities designed to foster an improved security posture within the organization. This research explores the firm characteristics and approaches to information risk of the participating BSIMM-V firms, primarily through text mining techniques. The objective of this research is to determine if there are any significant associations or relationships between firm characteristics, the activities identified by the BSIMM –V model, and reported information security incidents.
About the SpeakerJackie Rees Ulmer is currently an associate professor of Management Information Systems in the Krannert Graduate School of Management at Purdue University. She earned her Ph.D. in Decision and Information Sciences from the Warrington College of Business at the University of Florida in 1998. Her research interests include information security risk management, privacy, machine learning, particularly text mining and evolutionary computation. She has published in journals such as Communications of the ACM, Decision Sciences, Decision Support Systems, European Journal of Operational Research, Information System Research, INFORMS Journal on Computing, Information Technology and Management, International Journal of Electronic Commerce, and the Journal of Organizational Computing and Electronic Commerce. She teaches courses in Information Security, Principles of Management Information Systems, Java Programming, Database Management Systems, and Data Mining. She is currently serving as the director of accreditation for the Krannert School of Management and is also a CERIAS Fellow.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.