18 - A Framework For Information Security Governance and Management

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

IT GOVERNANCE AND MANAGEMENT

A Framework
for Information
Security
Governance and
Management
Marian Carcary, Maynooth University, Ireland
Karen Renaud, University of Glasgow, Scotland
Stephen McLaughlin and Conor O’Brien, Maynooth University, Ireland

The capability maturity framework presented helps organizations


assess their maturity state and identify problem areas. It addresses
the technical, process, and human aspects of information security and
provides guidelines for implementing information security governance
and management processes.

T
he ongoing escalation of security threats Initially, ISGM was regarded as a technical activity.
is driven by numerous factors, includ- However, this view is shifting toward more open,
ing progressively more ubiquitous mo- inclusive approaches that reflect the importance of
bile and cloud computing, social media embedding information security within organiza-
usage, and the increased digitization of business tional structures,3,4 and approaches that empha-
processes.1 These and other emerging technolog- size the development of an information security
ical developments, along with sophisticated inter- culture embedded in employees’ day-to-day work
nal and external attacks, ensure that a company’s practices.5–7 Although many ISGM frameworks
capacity to secure its information effectively re- exist that reflect this progressive thinking, they
mains a critical requirement for business survival. are often high-level and theoretical, and do not
Over time, changes in the nature of security offer practical suggestions to support their opera-
threats have necessitated an evolution in the ap- tionalization or implementation by practitioners.
proaches organizations adopt toward information Here, we present a practitioner-oriented ISGM
security governance and management (ISGM).2,3 capability maturity framework that incorporates

22 IT Pro March/April 2016 Published by the IEEE Computer Society 1520-9202/16/$33.00 © 2016 IEEE
Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.
IT Capability Maturity Framework
T he IT Capability Maturity Framework (IT-CMF)1
is an action-oriented, IT capability toolset that
provides a modular view of 35 IT-related critical
capabilities, and move toward their desired target
maturity state. Since its inception, IT-CMF has
been adopted by more than 400 organizations,
capabilities. For each IT-CMF capability, a series of and more than 500 formal assessments have been
management insights, maturity roadmaps, assess- undertaken. For more information, visit www.ivi.
ment instruments, and improvement guidelines nuim.ie.
has been developed. The framework’s five-level
maturity curve enables organizations to system- Reference
atically assess and understand their current IT 1. M. Curley, Managing Information Technology for
capability maturity, strategically prioritize specific Business Value, Intel Press, 2004.

technical, process, and human dimensions. The and consultants, who collaborated in a work-
framework is underpinned by the premise that group setting to co-produce the ISGM body of
the pace and manner with which an organiza- knowledge and maturity framework.
tion can proactively respond to new and emerg-
ing security threats depends on the maturity of The resultant framework produced enables orga-
its ISGM capability. Approaches to ISGM must nizations to understand their key ISGM strengths,
be fluid and responsive to the changing infor- weaknesses, and areas for improvement.
mation security landscape; by developing their
capabilities to sense, evaluate, and react to new Framework Overview
and emerging security threats, organizations can The ISGM framework focuses on determining
more proactively position themselves to effec- an organization’s ability to direct, oversee, and
tively and continually secure information assets. control the actions and processes required to
protect documented and digitized information
An Information Security Capability and information systems, and to guard against
Maturity Framework unauthorized access, use, disclosure, disruption,
The Innovation Value Institute (IVI) is a research modification, or destruction in order to provide
entity supported by a diverse international con- data confidentiality, integrity, availability, accessibil-
sortium of organizations, government agencies, ity, and usability.15,16 The framework expands the
and academic institutions. It was formed to ad- commonly cited triad of confidentiality, integrity,
dress the challenges faced in optimizing the and availability with the concepts of accessibil-
business value derived from the application of IT. ity and usability. With respect to accessibility, a
Using an open innovation collaborative research failure to support and understand how security
approach, IVI has developed a capability matu- can change work practices can impede how data
rity framework for ISGM that is a component of and information are accessed, shared, and acted
its IT Capability Maturity Framework (IT-CMF; on in an increasingly dynamic, competitive en-
see the sidebar for more information). Its devel- vironment. Similarly, usability is a key factor in
opment was informed through engaging stakeholders in core business process-
es; irrespective of the availability of technology
• comparisons with information security standards to support work practices, if the technology is
and frameworks (COBIT 5.0 for information se- difficult to interact and engage with, users might
curity,8 the Open Group’s Information Security adopt other locally developed, less secure meth-
Management Maturity Model,9 the IT Security ods of access. The ISGM framework classifies
Essential Body of Knowledge,10 and ISO 2700211); ISGM activities across the following six high-
• academic and practitioner literature analy- level activity categories:
sis5–7,12–14; and
• insights from subject matter experts and key • Governance provides the oversight structures to
opinion leaders, including academic researchers, support ISGM; it implements information se-
industry-based practitioners, thought leaders, curity strategy, policies, and controls; assigns

computer.org/ITPro 23
Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.
IT GOVERNANCE AND Management

Table 1. Capability building blocks (CBBs) for the framework.15,16

Category CBBs Description

Governance Information security Develop, communicate, and support the organization’s information security
strategy objectives.
Security policies & Establish and maintain security policies and controls, taking into account
controls relevant security standards, regulatory and legislative security requirements,
and the organization’s security objectives.
Security roles, Establish responsibilities and accountabilities for information security roles,
responsibilities, & and check enforcement.
accountabilities
Communication & Disseminate security approaches, policies, and other relevant information to
training develop security awareness and skills.
Security performance Report on the effectiveness and efficiency of information security policies and
reporting activities, and the level of compliance with them.
Supplier security Define security requirements pertaining to the procurement and supply of
hardware, software, services, and data.
Technical Security architecture Build security criteria into the design of IT solutions—for example, by
security defining coding protocols, depth of defense, configuration of security
features, and so on.
IT component security Implement measures to protect all IT components, both physical and virtual,
such as client computing devices, servers, networks, storage devices, printers,
and smartphones.
Physical infrastructure Establish and maintain measures to safeguard the IT physical infrastructure
security from harm. Threats to be addressed include extremes of temperature,
malicious intent, and utility supply disruptions.
Security Budget for security Provide security-related budget criteria.
resource Tools & resources Specify and procure security tools/products and resources; manage the tools,
management security solutions, and staff assigned for security purposes.
Resource effectiveness Measure “value for money” from security investments; capture feedback
from stakeholders on the effectiveness of security resource management.
Security risk Security threat profiling Gather intelligence on IT security threats and vulnerabilities to better understand
control the IT security threat landscape within which the organization operates,
including the actors, scenarios, and campaigns that might pose a threat.
Security risk assessment Identify exposures to security-related risks, and quantify their likelihood and
potential impact.
Security risk prioritization Prioritize information security risks and risk-handling strategies based on
residual risks and the organization’s risk appetite.
Security risk handling Implement strategies for handling information security risk, including risk
acceptance, transfer, absorption, and mitigation, as appropriate. Promote
interaction with incident management functions.
Security risk monitoring Manage the ongoing efficacy of information security risk-handling strategies
and control options.
Security data Data identification & Define information security classes, and provide guidance on protection and
administration classifications access control appropriate to each class.
Access rights Manage user access rights to information throughout its life cycle, including
management granting, denying, and revoking access privileges.
Data life-cycle Provide the security expertise and guidance to ensure that data throughout
management its life cycle is appropriately available, adequately preserved, or destroyed to
meet business, regulatory, and other security requirements.
Business Business continuity Provide stakeholders throughout the organization with security advice to
continuity planning assist in the analysis of incidents and to ensure that data is secure before,
management during, and after the execution of the business continuity plan.
Incident management Manage security-related incidents and near incidents. Develop and
train incident response teams to identify and limit exposure, manage
communications, and coordinate with regulatory bodies as appropriate.

24 IT Pro March/April 2016


Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.
roles and responsibilities for ISGM activities; nent and physical environment security guidelines
provides communication and training; reports are emerging. There is some consideration of se-
on ISGM activities’ effectiveness; and manages curity budget requirements within IT, and require-
supplier security requirements. ments for high-level security features are specified
• Technical security establishes a security architec- for major software and hardware purchases. A ba-
ture and implements measures to manage IT sic security risk-management process is established
component and physical infrastructure security. within IT based on perceived risk. Access rights
• Security resource management provides security management is dependent on vendor-supplied so-
budgets, tools, and resources, and measures the lutions. Processes for managing the security of data
resource effectiveness of security investments. throughout its life cycle are emerging. Major secu-
• Security risk control profiles security threats and rity incidents are tracked and recorded within IT.
assesses, prioritizes, handles, and monitors
security-related risks. Intermediate. Level 3 maturity reflects a detailed
• Security data administration defines data security information security strategy that’s regularly
classifications and provides guidance on man- aligned to business and IT strategies and risk ap-
aging access rights and data throughout its life petite across IT and some other business units.
cycle. Information security policies and standards are
• Business continuity management plans and tests developed and revised based on a defined process
the security of business continuity measures and regular feedback. IT and some other business
and manages security inputs into incident units have agreed-on IT component and physical
management.15,16 environment security measures. IT budget pro-
cesses acknowledge and provide for the most im-
As Table 1 shows, these high-level activity catego- portant information security budget requests in
ries are decomposed into 22 capability building IT and some other business units. The security
blocks (CBBs). risk-management process is proactive and jointly
shared with corporate collaboration. Access rights
Framework Maturity Profile are granted based on a formal and audited autho-
With respect to each of the CBBs outlined in Ta- rization process. Detailed processes for managing
ble 1, the framework defines a five-level maturity data security throughout its life cycle are imple-
curve15 that serves as the basis for understanding mented. Security incidents are managed based on
an organization’s ISGM capability and provides a the urgency to restore services, as agreed on by IT
foundation for capability improvement planning. and some other business units.

Initial. Level 1 maturity is characterized by the ad Advanced. Level 4 maturity is characterized


hoc definition of an information security strat- by regular, enterprise-wide improvement in the
egy, policies, and standards. Physical environ- alignment of the information security strategy,
ment and IT component security are only locally policies, and standards with business and IT
addressed. There is no explicit consideration of strategies and compliance requirements. IT com-
budget requirements for information security ac- ponent security measures on IT systems are im-
tivities, and no systematic management of secu- plemented and tested enterprise-wide for threat
rity risks. Access rights and the security of data detection and mitigation. Physical environment
throughout its life cycle are managed at best us- security is integrated with access controls and
ing informal procedures. Similarly, security inci- surveillance systems across the enterprise. De-
dents are managed in an ad hoc manner. tailed security budget requirements are incor-
porated in enterprise-wide business planning
Basic. Level 2 maturity reflects the linking of a ba- and budgeting activities. A standardized security
sic information security strategy to business and risk-management process is aligned with an en-
IT strategies and risk appetite in response to indi- terprise risk-management process. Access rights
vidual needs. It also involves the development and are implemented and audited across the enter-
review of information security policies and stan- prise. Data is effectively preserved throughout
dards, typically after major incidents. IT compo- its life cycle, and data availability is effectively

computer.org/ITPro 25
Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.
IT GOVERNANCE AND Management

Maturity of capability building blocks Initial Basic Intermediate Advanced Optimizing


1.5 4.0
Information security strategy 2.0 3.3
Security policies & controls 2.0 4.0
Security roles, responsibilities 1.5 3.5
Governance
Communication & training 2.0 3.0
Security performance reporting 2.0 3.5
Supplier security 2.0 3.0
Security architecture 2.5 4.0
Technical security IT component security 2.0
Physical infrastructure security 1.0 3.0
Security budgeting 2.0
Security resource
Resource effectiveness 2.0 3.0
management
Tools & resources 1.0
Security threat profiling 2.0 4.0
Security risk assesment
Security risk Security risk prioritization
control 1.0 2.5
Security risk handling 2.0 4.0
Security risk monitoring 3.0
Data identification & classifications 1.5 3.5
Security data
Access rights management 2.0 3.0
administration
Data life-cycle management 3.0 4.0
Business continuity Business continuity planning 2.0 4.0
management Incident management

Current maturity Target maturity Average maturity for CC

Figure 1. Assessment results showing an organization’s maturity ratings across the capability building blocks (CBBs).

managed to meet business, regulatory, and secu- ed incident prediction systems are in place, and
rity requirements. Recurring incidents are sys- security incidents are effectively managed.
tematically addressed enterprise-wide through
problem-management processes that are based Assessing Capability Maturity
in root cause analysis. The framework’s assessment tool provides a
granular and focused view of an organization’s
Optimizing. Level 5 maturity reflects an informa- current maturity state for each CBB, desired or
tion security strategy that is regularly aligned to target maturity state for each CBB, and impor-
business and IT strategies and risk appetite across tance attributed to each CBB. These maturity and
the business ecosystem. Information security pol- importance scores are primarily determined by an
icies and standards are periodically reviewed and online survey undertaken by the organization’s
revised based on input from the business ecosys- key IT and business stakeholders. The survey
tem. The management of IT component security typically takes each assessment participant 40–50
is optimized across the security framework layers. minutes to complete, and the data collected can be
Physical access and environmental controls are augmented by qualitative interview insights that
regularly improved. Security budget requirements focus on issues such as key information-security-
are improved to provide adequate funding for cur- related business priorities, successes achieved,
rent and future security purposes. The security and initiatives taken or planned. The assessment
risk-management process is agile and adaptable, provides valuable insight into the similarities and
and tools can be used to address the business eco- differences in how key stakeholders view both the
system’s requirements. Access rights management importance and maturity of individual CBBs, as
is dynamic and can effectively address organiza- well as the overall vision for success.
tional restructures, acquisitions, and divestments. Figure 1 shows the results of an organization’s
Processes for managing data security throughout ISGM capability maturity assessment, outlining
its life cycle are continuously improved. Automat- its current and target CBB maturity across all

26 IT Pro March/April 2016


Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.
22 CBBs. For each CBB, the maturity results are tween current and target CBB maturity states,
automatically generated by the IVI assessment mapped against the importance attributed to the
tool, based on averaging the scores of all survey various CBBs. These results are automatically
participants across all questions pertaining to generated by the IVI assessment tool, based on
that CBB. Based on this average score achieved, averaging the current maturity scores, the tar-
the organization highlighted in Figure 1 reflects get maturity scores, and the importance scores
a level 1.8 (initial) current maturity status for of all survey participants, across all questions
ISGM overall, but it is less mature in some CBBs, pertaining to that CBB. The distance or gap be-
such as security budgeting, resource effective- tween the averaged current maturity score and
ness, security threat profiling, and security risk the averaged target maturity score is plotted
handling. Based on the average across all CBBs, against the averaged importance score. Those
its desired target ISGM maturity state is maturity CBBs reflected in the gray-shaded quadrant
level 3.6 (intermediate). of Figure 2—specifically, information security
Plotting current and target levels of maturity strategy, security threat profiling, access rights
and strategic importance helps an organization management, and incident management—are
identify gaps in capabilities, and this becomes highly important but have the largest gaps to
the foundation for capability improvement plan- bridge, and as such are identified as priorities
ning. Figure 2 reflects the organization’s gap be- for future improvement.

A1 Information security strategy

2.5 A1 A2 Security policies & controls


Governance A3 Security roles, responsibilities
A4 Communication & training
2.3 A5 Security performance reporting
A6 Supplier security
B1 Security architecture
2.1 Technical B2 IT component security
D5 security B3 Physical infrastructure security
A3 F2 D1
C1 D3 B3 A4
E2 Security C1 Security budgeting
1.9 D2 resource C2 Resource effectiveness
management C3 Tools & resources
D1 Security threat profiling
Maturity gap

1.7
Security risk D2 Security risk assessment

control D3 Security risk prioritization


D4 Security risk handling
A6 D4
1.5 B2 D5 Security risk monitoring

E1 Data identification &


Security data classifications
A2 E2 Access rights management
1.3 administration
E3 Data life-cycle management

Business F1 Business continuity planning

1.1 continuity F2 Incident management


management
A5 C3 E3
F1
C2 E1 B1
0.9

0.7
2.9 3.2 3.4 3.7 3.9 4.2 4.4 4.7 4.9
Importance

Figure 2. Assessment results showing an organization’s maturity gap vs. importance scores for all capability
building blocks.

computer.org/ITPro 27
Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.
IT GOVERNANCE AND Management

Table 2. Example practices and metrics to drive improvement in specific capability building blocks (CBBs).15

Current Next-level Practices to increase CBB


CBB maturity maturity maturity level Metrics
Information 1.5 2 Develop basic information Existence and availability of security
security strategy security strategies that strategies that include business and
consider IT and business IT strategies and risk appetite
strategies and risk appetite. Number and percent of
stakeholders aware of and using
information security strategies
Security threat 1 2 Conduct basic intelligence Number of threat areas covered by
profiling gathering and create basic the threat profile
threat profiles. Number of threat agents identified

Access rights 1.5 2 Establish a process to withdraw Number of access rights audit
management employee access rights if abused. exceptions
Discourage sharing of credentials. Number of grant/revoke of access
Provide employees with access rights by department
to a password-management
package.
Incident 2 3 Prioritize and manage security Number of business units that
management incidents based on the urgency contributed to prioritization
to restore services. Record Number of incidents and percent
security incidents and handling resolved
actions in IT and some other
business units.

Developing Improvement Action Plans formation security consultants and practitioners.


The output from the framework’s assessment They stated, for example, that the framework
supports understanding the actions necessary to
drive improvement and enable the organization to • “provides a consistent, easy-to-use, and busi-
systematically transition from its current to target ness-focused framework and common language
maturity state. This is achieved by implementing to use across the organization”;
a series of industry-validated practices that en- • “works for organizations across all sizes and
able organizations to incrementally improve, and sectors by providing a structured yet flexible se-
monitoring and tracking progress over time using curity framework and common language to set
a series of industry-validated metrics. Table 2 in- agreed-on security targets specific to that busi-
cludes sample practices and metrics for the four ness and measure tangible improvement”; and
CBBs highlighted for prioritized improvement in • “enables organizations to set the security stan-
Figure 2. For each of these CBBs, the figure out- dard appropriate to that individual business
lines the current reported maturity and the prac- and harness resources across the organization
tices required to transition to the next maturity to achieve a level of security to deliver business
state. Note that additional practices are available confidence and advantage.”
to support transitioning to the desired maturity
state. One organization commented that “using the
framework to improve our capability is our com-
Framework Efficacy: mitment to applying best practice to data stew-
Insights from Industry ardship; safeguarding business data goes hand in
The framework we present is currently being ad- hand with safeguarding other business assets in
opted by member organizations of the IVI Con- protecting the value of the business.”
sortium. The relevance of adopting and employing Such comments reflect the value of applying a
this capability maturity approach to managing capability maturity approach to identifying and
and governing information security is reflected in resolving ISGM problem areas to effectively pro-
the following sample comments from several in- tect against new and emerging security threats.

28 IT Pro March/April 2016


Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.
T
he turbulent nature of the information se- 7. J. Spears and H. Barki, “User Participation in Infor-
curity threat landscape, in a business envi- mation Systems Security Risk Management,” MIS
ronment characterized by IT pervasiveness, Quarterly, vol. 34, no. 3, 2010, pp. 503–528.
dictates the strategic imperative to effectively gov- 8. COBIT 5—A Business Framework for the Governance and
ern and manage information security. Within orga- Management of Enterprise IT, ISACA, 2012.
nizations, both business and IT stakeholders need 9. Open Information Security Management Maturity Model,
to focus on closing the gap between the current Open Group, Van Haren, 2011.
and required level of ISGM capability to effective- 10. “IT Security Essential Body of Knowledge,” US Dept.
ly protect against new and emerging threats. The of Homeland Security, 2008; http://csrc.nist.gov/
capability approach helps focus organizations on groups/SMA /ispab/documents/minutes/2007-12/
continually evaluating, re-evaluating, and develop- ISPAB_Dec7-BOldfield.pdf.
ing the ISGM capability in line with environmental 11. ISO/IEC 27002:2013—Information Technology—Secu-
changes and new opportunities and threats. rity Techniques—Code of Practice for Information Secu-
As we’ve highlighted, the ISGM framework rity Controls, Int’l Organization for Standardization,
provides a practical and action-oriented toolkit 2013.
to assist organizations in driving and improving 12. S. Alfawaz, K. Nelson, and K. Mohannak, “Infor-
ISGM capability maturity. Through periodically mation Security Culture: A Behaviour Compliance
assessing the ISGM capability and determining Conceptual Framework,” Proc. 8th Australasian Conf.
aspects or building blocks for prioritized im- Information Security, 2010, pp. 47–55.
provement based on their strategic importance, 13. A. Da Veiga and J.H.P. Eloff, “A Framework and
an organization can measure over time its prog- Assessment Instrument for Information Security
ress in transitioning to the desired capability Culture,” Computers and Security, vol. 29, no. 2, 2010,
level and the value derived in so doing, as well pp. 196–207.
as develop a roadmap and action plan for future 14. J.F. Van Niekerk and R. Von Solms, “Information Se-
­initiatives. curity Culture: A Management Perspective,” Comput-
ers and Security, vol. 29, no. 4, 2010, pp. 476–486.
References 15. “Information Security Management,” Innovation
1. M. Suby, The 2013 (ISC)2 Global Information Security Value Institute, 2015; https://ivi.nuim.ie/it-cmf/
Workforce Study, Frost and Sullivan Market Survey, information-security-management.
2013. 16. The Information Technology Capability Maturity Framework
2. E. Alqurashi, G. Wills, and L. Gilbert, “A Viable System (IT-CMF)—The Body of Knowledge Guide, M. Curley, J.
Model for Information Security Governance: Estab- Kenneally, and M. Carcary, eds., Van Haren, 2015.
lishing a Baseline of the Current Information Security
Operations System,” Security and Privacy Protection in In- Marian Carcary is a senior lead researcher with the Inno-
formation Processing Systems, Springer, 2013, pp. 245–256. vation Value Institute at Maynooth University, Ireland. Her
3. R. Reese, S. Chaudhry, and P.E. Chaudhry, “Devel- research interests include design science, information security
oping a Model for Enterprise Information Systems management, and cloud computing. Carcary researches the
Security,” Economics, Management, and Financial Mar- development and deployment of the IT Capability Matu-
kets, vol. 4, 2012, pp. 587–599. rity Framework (IT-CMF), and has managed and worked
4. M.S. Saleh and A. Alfantookh, “A New Comprehen- on national and European-funded projects in the areas of
sive Framework for Enterprise Information Security e-skills and IT management for small and medium-sized en-
Risk Management,” Applied Computing and Informatics, terprises. Contact her at marian.carcary@nuim.ie.
vol. 9, no. 2, 2011, pp. 107–118.
5. Q. Hu et al., “Managing Employee Compliance with Karen Renaud is a computer scientist at the University of
Information Security Policies: The Critical Role of Glasgow, Scotland. Her research interests include human-
Top Management and Organizational Culture,” Deci- centred security, knowledge visualization, and SMS-based
sion Sciences, vol. 43, no. 4, 2012, pp. 615–660. voting. Renaud has made contributions in the fields of us-
6. R. Hyeun-Suk, U.R. Young, and K. Cheong-Tag, able security, technology adoption, email usage, electronic
“Unrealistic Optimism on Information Security voting, and design patterns, and has worked with organi-
Management,” Computers and Security, vol. 31, no. 2, zations in the field of security management. Contact her at
2012, pp. 221–232. karen.renaud@glasgow.ac.uk.

computer.org/ITPro 29
Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.
IT GOVERNANCE AND Management

Stephen McLaughlin is the former head of R&D for the His research interests are in adaptive self-auditing pro-
Innovation Value Institute and IT Competence Centre at cesses and understanding the contribution of knowledge
Maynooth University, Ireland. His research interests are sources to innovative practices in software development
in understanding how organizations can develop effec- environments. O’Brien is an accomplished IT profes-
tive performance-related knowledge transfer mechanisms. sional with extensive experience in business analysis,
McLaughlin has led research for IBM in identifying knowl- innovative solutions conceptualization, and solutions
edge and innovation barriers within complex organizations, design, development, test, and delivery. Contact him at
and developing frameworks for assessing service innovation conor.obrien@nuim.ie.
capability. Contact him at stephen.mclaughlin@nuim.ie.

Conor O’Brien is a senior researcher at the Innova- Selected CS articles and columns are available
tion Value Institute at Maynooth University, Ireland. for free at http://ComputingNow.computer.org.

MAY/JUNE 2015 WWW.COMPUTER.ORG/SOFTWARE


IEEE SOFTWARE
May/June 2015

IEEE Software offers


MARCH/APRIL 2015 WWW.COMPUTER.ORG/SOFTWARE

pioneering ideas,
SYSTEMS AND SOFTWARE VARIABILITY

IEEE SOFTWARE

expert analyses, and


thoughtful insights for
March/April 2015

software professionals
who need to keep up
Volume 32 Number 3

with rapid technology


RELEASE ENGINEERING

CO
DE
MA INFL A

change. It’s the authority


NA
GIN TION
GT //
ECH 10
NIC
AL
D EB
T //

on translating software
22
JANUARY/FEBRUARY 2015 WWW.COMPUTER.ORG/SOFTWARE
IEEE SOFTWARE

theory into practice.

www.computer.org/
Volume 32 Number 2
January/February 2015

software/subscribe
INTERNETWARE AND BEYOND

MEANINGFUL INDUSTRIAL—
ACADEMIC PARTNERSHIPS // 18
MOBILE MONEY IN TANZANIA // 29
Volume 32 Number 1

30 IT Pro March/April 2016


Authorized licensed use limited to: North West University. Downloaded on December 02,2020 at 22:14:56 UTC from IEEE Xplore. Restrictions apply.

You might also like