Copy reference, caption or embed code

- Business Strategy analysis of Cybersecurity Incidents

Figure no. 1: Balanced Scorecard (Source: Kaplan & Norton, 1992) The BSC has undergone several iterative developments since its first release. Part of the framework's development was its extension to other fields as IT BSC and IT and cybersecurity BSC. The IT BSC (Van Grembergen, 2000) is in the analogy of the original structure through User orientation, Business contribution, Operational excellence, and Future orientation lead by the business strategy. The User Orientation perspective represents the IT user assessment, and the Operational Excellence perspective comprises the IT processes used to develop and deliver applications. The Future Orientation covers the human and technological resources needed to provide IT and services, while the Business Contribution perspective captures IT investments' business value. Unsurprisingly, the security BSC (Herath, Herath, & Bremser, 2010) is in parallel with the IT BSC. The security BSCs have the Business Value perspective, the Stakeholder Orientation perspective, the Internal Processes perspective, and the Future Readiness perspective. Business value is provided by ensuring confidentiality, availability, integrity, and authenticity and non-repudiation. Stakeholder consideration
Figure no. 1: Balanced Scorecard (Source: Kaplan & Norton, 1992) The BSC has undergone several iterative developments since its first release. Part of the framework's development was its extension to other fields as IT BSC and IT and cybersecurity BSC. The IT BSC (Van Grembergen, 2000) is in the analogy of the original structure through User orientation, Business contribution, Operational excellence, and Future orientation lead by the business strategy. The User Orientation perspective represents the IT user assessment, and the Operational Excellence perspective comprises the IT processes used to develop and deliver applications. The Future Orientation covers the human and technological resources needed to provide IT and services, while the Business Contribution perspective captures IT investments' business value. Unsurprisingly, the security BSC (Herath, Herath, & Bremser, 2010) is in parallel with the IT BSC. The security BSCs have the Business Value perspective, the Stakeholder Orientation perspective, the Internal Processes perspective, and the Future Readiness perspective. Business value is provided by ensuring confidentiality, availability, integrity, and authenticity and non-repudiation. Stakeholder consideration
Go to figure page
Reference
Caption
Embed code