EconPapers    
Economics at your fingertips  
 

Maximising resource allocation effectiveness for IT security investments

Shivraj Kanungo, Vikas Jain and Ernest H. Forman

International Journal of Business Information Systems, 2011, vol. 7, issue 2, 166-180

Abstract: Organisational IT security spending is expected to increase substantially in the next few years. The challenge for IT managers and CIOs continues to grow in terms of allocating IT security investments across competing projects, products, or initiatives. Past approaches suggest use of sorting mechanism based on the analytic hierarchy process (AHP) to allocate resources across portfolio of IT security applications. It has also been suggested that using cost-benefit ratio provides a better way to prioritise resource allocations. Using the case of resource allocation for IT security at a large financial institution, we show that optimisation is a better approach than sorting to allocate IT security resources. We also show that cost-benefit ratio is not always the most effective way for evaluating IT security resource allocations. The findings of this study have significant implications for IT security managers who often face the challenge of maintaining balance between IT security budget and addressing maximum number of potential vulnerabilities.

Keywords: resource allocation; analytical hierarchy process; AHP; organisational security; security spending; information technology; communications technology; ICT; security investments; CIOs; chief information officers; security managers; competing initiatives; competing projects; competing products; sorting mechanisms; security applications; cost-benefit ratios; prioritisation; financial institutions; optimisation; evaluation; balance; budgets; potential vulnerabilities; USA; United States; business information systems. (search for similar items in EconPapers)
Date: 2011
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=38510 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijbisy:v:7:y:2011:i:2:p:166-180

Access Statistics for this article

More articles in International Journal of Business Information Systems from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker (informationadministrator5@inderscience.com).

 
Page updated 2025-03-19
Handle: RePEc:ids:ijbisy:v:7:y:2011:i:2:p:166-180