Loading...
Paper Type
ERF
Abstract
This paper evaluates activities related to the creation and operation of a Security Operations Center (SOC). This SOC is owned by a business college and is run with the cooperation of the university’s information technology department. The creation, nature, and evolution of relationships between the SOC and its external partners are explored and defined. A National Institute of Standards and Technology (NIST) Cybersecurity framework is used as a context and Social Exchange Theory is used as a lens for interpretation and explanation.
Recommended Citation
Shemroske, Kenneth, "Defining Roles, Relationships, and Value in Cybersecurity Operations" (2020). AMCIS 2020 Proceedings. 35.
https://aisel.aisnet.org/amcis2020/info_security_privacy/info_security_privacy/35
Defining Roles, Relationships, and Value in Cybersecurity Operations
This paper evaluates activities related to the creation and operation of a Security Operations Center (SOC). This SOC is owned by a business college and is run with the cooperation of the university’s information technology department. The creation, nature, and evolution of relationships between the SOC and its external partners are explored and defined. A National Institute of Standards and Technology (NIST) Cybersecurity framework is used as a context and Social Exchange Theory is used as a lens for interpretation and explanation.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.