SlideShare a Scribd company logo
Running head: Information Systems Security Techniques: A Review of State of Art
INFORMATION SYSTEMS SECURITY TECHNIQUES: A REVIEW OF STATE OF ART
Nelson Kimathi Kinyua
Jomo Kenyatta University of Agriculture and Technology
Abstract
This study provides a short literature review in information systems security techniques and
approaches either technical or non-technical in nature. Although, the benefits and uses of the
technical information systems security techniques are valuable, there is still a need to investigate
the alternative non-technical techniques or at least, to find a way to combine them in a more
appropriate and thus, successful way. In doing so, this paper presents the available
methods and techniques in information systems security in an attempt to shed some light
into how these alternative approaches could be used in benefit of information systems security.
Keywords: Information systems security, Positivistic-interpretivist approaches, Case studies.
Introduction
Over the years, a number of security approaches have been developed that help in managing IS
security and in limiting the chances of an IS security breach. A security breach is an act from
outside an organization that bypasses or contravenes security policies, practices and procedures
relative to information systems security.
First and second generation methods aim at finding out what can be done and actually dominate
the principles, checklists, and most standards for secure systems development. Third generation
approaches include modelling and fourth generation emphasize socio-technical design. Siponen
(2010) supports the view that there have been only a few isolated (less-well known) approaches
to consider the socio-technical aspects of information systems security management. The
Running head: Information Systems Security Techniques: A Review of State of Art
majority of IS security methods entails checklists, risk analysis, and evaluation methods.
Although these approaches help in managing security, Siponen (2010) supports the need for IS
security approaches to provide a holistic modelling support which can be integrated into modern
IS development approaches, and the lack of approaches which focus on socio-organizational
roles of IS security Hirschheim et al., (2012), Backhouse and Dhillon (2011), Hitchings (2013)
and James (2013), suggest that although the value of most IS security methods, tools, and
techniques is evident, their focus is on narrow, technically oriented solutions and they ignore
the social aspects of risks and the informal structures of organizations (see also the arguments
proposed by Baskerville, 2011; Willcocks and Margetts, 2016; Siponen, 2010). Dhillon and
Backhouse (2011) have also analyzed existing approaches within the socio-philosophical
framework of Burrell and Morgan (1979) and in so doing; they suggest that a socio-
organizational perspective is the way forward if information systems security is to be achieved.
The social-philosophical framework of Burrell and Morgan has been widely used in the literature
by other researchers as well despite its criticisms. For instance, Hassard (2013) used it as a model
to produce four different accounts of work behavior in the British Fire Service, Korukonda and
Hunt (2011) used it to study leadership, while Rickards (2009) used the four paradigmatic
positions to explore creativity and the management of change. Since these studies give credibility
to the Burrell and Morgan classification framework, this study uses these four sociological
paradigms to present a short literature review in information systems security techniques.
RelatedWork
The functionalist researchers approach the subject from an objective point of view and in the
context of information systems security they believe that information security is based on a
good information security policy (Parker, 2010). A meta-policy will allow an organization to be
flexible when it makes and maintains its security policies although there has been little research
on the need for meta-policies and their use within organizations.
Interpretivist researchers examine information systems security from a contextual and human
perspective and they view organizations in terms of their stable underlying patterns of behavior.
In doing so, it is feasible to capture into a model the interactions that are necessary to achieve
synchronized, cooperative action (Backhouse and Dhillon, 2011). Up to date, most of the
Running head: Information Systems Security Techniques: A Review of State of Art
research literature on information systems security has focused on the technical characteristics of
information security such as software design, or hardware performance and there is an equal
need to integrate these technical issues into a social context, considering organizations’ norms,
purpose and interpretation of information.
Radical humanist researchers focus on human’s dependence from the structures which limit its
potential for development. Future research can focus on the notion of change occurring through
managerial decisions on information security. For instance, what happens when the implemented
security level is too narrow or complex?
The radical structuralist researchers suggest that information systems security imposed by senior
managers can result in tension with employees because security measures may have an impact on
perceived trust and may affect negatively work cohesion (Koskosas, 2011). Radical structuralism
considers social reality as deemed to be a ‘fact’, so the social world is made up of contradictions
and intrinsic tensions whereas, the result would be radical change in the social systems as a
whole. Future research within the structuralist framework should focus on information systems
security planning and the contradictions that may result.
Conclusions
There is an equal need to undertake research within the social – organizational context of
information systems security in order to integrate them with the technical characteristics of
information security. In doing so, information systems security planning, development and
management can be achieved more effectively than ever before since senior managers and the IT
staff involved, will have a broader view of the issue under concern either from a technical or
non-technical perspective.
For example, if organizational values, beliefs and exemplars are not widely shared there may be
a misinterpretation of the intended information systems security plan. The stronger these values
and beliefs are commonly shared among the IT staff, the better and clearer the information
security vision to be achieved in accordance to overall business goals.
Since most of the organizations deploy information systems into almost any aspect of business,
information security needs to be explored through human interaction, patterns of behaviors,
Running head: Information Systems Security Techniques: A Review of State of Art
contradictions and meanings associated with security activities and integrate all of them
with the technical characteristics of information security.
Although each of the four frameworks-paradigms has its own strengths and weaknesses
(Hirschheim and Klein, 2012), they can be used as a basis for future research directions in
information security planning, development and management. Or better yet, to understand why
there will always be a need to integrate technical and socio-organizational characteristics of
information security in order to deploy persistent systems.
REFERENCES
Anderson, A.M. et al. (1993), The Risk Data Repository: A Novel Approach to security Risk
Modeling.
Proceedings of the Ninth IFIP International Symposium on Computer Security, IFIP Sec 1993,
Deerhurst, Ontario, Canada, pp.179-188.
Backhouse, J. and Dhillon, G. (1996), Structures of Responsibility and Security of Information
Systems, European Journal of Information Systems, 5(1), pp.2-9.
Baskerville, R. (1988), Designing Information Systems Security, New York: John Wiley
and Sons, Information Systems Series.
Baskerville, R. (1991), Risk Analysis: An Interpretive Feasibility Tool in Justifying Information
Systems Security, European Journal of Information Systems, 1(2), pp.121-130.
Baskerville, R. (1993), Information Systems Security Design Methods: implications for
information systems development, ACM Computing Surveys, 25(4), pp.375- 414.
Baskerville, R. and Siponen, M. (2002), An Information Security Meta-Policy for
Emergent Organizations, Logistics Information Management, 15(5/6), pp. 337- 346.
Beynon-Davies, P. (1997), Ethnographic and Information Systems Development: Ethnography
of, for and within IS Development, Information and Software Technology, 39(8), pp. 531-540.
Birch, D. and McEvoy, N. (1992), Risk Analysis for Information Systems, Journal of
Information Technology, 7, pp. 44-53.
Running head: Information Systems Security Techniques: A Review of State of Art
Boockholdt, J.L. (1987), Security and Integrity Controls for Microcomputers: A Summary
Analysis, Information and Management, 13(2), pp.33-41.
BSI (2000), British Standards Institution, Annual Reports 2000.
Burrell, G. and Morgan, G. (1979), Sociological Paradigms and Organizational Analysis,
London: Heinman.
Bresser R. K. and Bishop R. C (1983), Dysfunctional Effects of Formal Planning: Two
Theoritical Explanations, Academy of Management Review, 8(2), pp.588 – 599.
Courtney, R. (1977), Security Risk Analysis in Electronic Data Processing. Proceedings of the
AFIPS Conference, National Computer Conference (R.R.Korfhage), Vol. 46, AFIPS Press,
pp.97-104.
Dhillon, G. & Backhouse, J. (2001), Current directions in IS security research: towards socio-
organisational perspectives, Information Systems Journal, 11, pp. 127-153.
Dobson, J. (1991), A Methodology for Analysing Human and Computer-Related Issues in
Secure Systems, In: IFIP International Conference in Computer Security and Information
Integrity, Amsterdam, pp.151-170.
Fisher, R. (1984), Information Systems Security, Prentice-Hall, Englewood Cliffs, NJ.
Fitzgerald, J. (1978), EDP Risk Analysis for Contingency Planning, EDP Audit Control and
Security Newsletter, 6(2), pp.1-8.
Gallegos, F., Dana, R.R., and Borthick, A.F. (1987), Audit and Control of Information Systems,
Cincinnati, OH: South- Western Publishing Co.
Galliers, R.D. (1987), Information Systems Planning in the United Kingdom and Australia: A
Comparison of Current Practice, In: Oxford Surveys in Information Technology, Vol.4, P.I.
Zorkoczy (ed.), pp.223-255.
Hassard, J. (1991), Multiple Paradigms and Organizational Analysis: A Case Study,
Organization Studies, 12(2), pp. 275-299.
Hirschheim, R., Klein, H.K. (1989), Four Paradigms of Information Systems Development,
Communications of the ACM, 32(10), pp. 1199-1215.
Hirschheim, R. (1992), Information Systems Epistemology: An Historical Perspective, In:
Information Systems Research: Issues, Methods, and Practical Guidelines, R. Galliers, (eds.)
Blackwell Scientific Publications, Oxford, pp. 28-60.
Running head: Information Systems Security Techniques: A Review of State of Art
Hirschheim, R., Klein, H.K. and Lyytinen, K. (1995), Information Systems Development and
Data Modelling: Conceptual and Philosophical Foundations, Cambridge: Cambridge University
Press, UK.
Hitchings, J. (1996), A Practical Solution to the Complex Human Issues of Information Security
Design, In: Information Systems Security: Facing the Information Society of the 21st Century.
Gritzalis, D. (eds), pp. 3-12, London: Chapman and Hall.

More Related Content

What's hot

Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
CSCJournals
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
IJNSA Journal
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
OxfordCambridge
 
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
IJCSES Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
CSCJournals
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
Luxembourg Institute of Science and Technology
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
CSCJournals
 
Learning ethical hacking
Learning ethical hackingLearning ethical hacking
Learning ethical hacking
mhmdtolba
 
Information Security Governance #2A
Information Security Governance #2A Information Security Governance #2A
Information Security Governance #2A
Marius FAILLOT DEVARRE
 
11.determining the relationship between information technology and leadership...
11.determining the relationship between information technology and leadership...11.determining the relationship between information technology and leadership...
11.determining the relationship between information technology and leadership...
Alexander Decker
 
Report on Information Security
Report on Information SecurityReport on Information Security
Report on Information SecurityUraz Pokharel
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
Marius FAILLOT DEVARRE
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
CSCJournals
 
Information security
Information securityInformation security
Information security
Sanjay Tiwari
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 

What's hot (18)

Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
 
Availability
AvailabilityAvailability
Availability
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
 
Learning ethical hacking
Learning ethical hackingLearning ethical hacking
Learning ethical hacking
 
Information Security Governance #2A
Information Security Governance #2A Information Security Governance #2A
Information Security Governance #2A
 
11.determining the relationship between information technology and leadership...
11.determining the relationship between information technology and leadership...11.determining the relationship between information technology and leadership...
11.determining the relationship between information technology and leadership...
 
Report on Information Security
Report on Information SecurityReport on Information Security
Report on Information Security
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Research Proposal
Research ProposalResearch Proposal
Research Proposal
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
 
Information security
Information securityInformation security
Information security
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 

Similar to Ics 3210 information systems security and audit - edited

Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
IJCNCJournal
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
IJCNCJournal
 
A Descriptive Review And Classification Of Organizational Information Securit...
A Descriptive Review And Classification Of Organizational Information Securit...A Descriptive Review And Classification Of Organizational Information Securit...
A Descriptive Review And Classification Of Organizational Information Securit...
Brandi Gonzales
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
IJECEIAES
 
[IJCT-V3I2P29] Authors:Karandeep Kaur
[IJCT-V3I2P29] Authors:Karandeep Kaur[IJCT-V3I2P29] Authors:Karandeep Kaur
[IJCT-V3I2P29] Authors:Karandeep Kaur
IJET - International Journal of Engineering and Techniques
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security Controls
Thomas Jones
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
florriezhamphrey3065
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
healdkathaleen
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
ijtsrd
 
Running head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securiRunning head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securi
DIPESH30
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docx
carlt4
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
LynellBull52
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
todd241
 
Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness ProgrammeTowards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programme
tulipbiru64
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
SusanaFurman449
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
Determining the relationship between information technology and leadership style
Determining the relationship between information technology and leadership styleDetermining the relationship between information technology and leadership style
Determining the relationship between information technology and leadership styleAlexander Decker
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
Anne ndolo
 

Similar to Ics 3210 information systems security and audit - edited (20)

Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
 
A Descriptive Review And Classification Of Organizational Information Securit...
A Descriptive Review And Classification Of Organizational Information Securit...A Descriptive Review And Classification Of Organizational Information Securit...
A Descriptive Review And Classification Of Organizational Information Securit...
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 
[IJCT-V3I2P29] Authors:Karandeep Kaur
[IJCT-V3I2P29] Authors:Karandeep Kaur[IJCT-V3I2P29] Authors:Karandeep Kaur
[IJCT-V3I2P29] Authors:Karandeep Kaur
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security Controls
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
Running head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securiRunning head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securi
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docx
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
 
Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness ProgrammeTowards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programme
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
Determining the relationship between information technology and leadership style
Determining the relationship between information technology and leadership styleDetermining the relationship between information technology and leadership style
Determining the relationship between information technology and leadership style
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Ics 3210 information systems security and audit - edited

  • 1. Running head: Information Systems Security Techniques: A Review of State of Art INFORMATION SYSTEMS SECURITY TECHNIQUES: A REVIEW OF STATE OF ART Nelson Kimathi Kinyua Jomo Kenyatta University of Agriculture and Technology Abstract This study provides a short literature review in information systems security techniques and approaches either technical or non-technical in nature. Although, the benefits and uses of the technical information systems security techniques are valuable, there is still a need to investigate the alternative non-technical techniques or at least, to find a way to combine them in a more appropriate and thus, successful way. In doing so, this paper presents the available methods and techniques in information systems security in an attempt to shed some light into how these alternative approaches could be used in benefit of information systems security. Keywords: Information systems security, Positivistic-interpretivist approaches, Case studies. Introduction Over the years, a number of security approaches have been developed that help in managing IS security and in limiting the chances of an IS security breach. A security breach is an act from outside an organization that bypasses or contravenes security policies, practices and procedures relative to information systems security. First and second generation methods aim at finding out what can be done and actually dominate the principles, checklists, and most standards for secure systems development. Third generation approaches include modelling and fourth generation emphasize socio-technical design. Siponen (2010) supports the view that there have been only a few isolated (less-well known) approaches to consider the socio-technical aspects of information systems security management. The
  • 2. Running head: Information Systems Security Techniques: A Review of State of Art majority of IS security methods entails checklists, risk analysis, and evaluation methods. Although these approaches help in managing security, Siponen (2010) supports the need for IS security approaches to provide a holistic modelling support which can be integrated into modern IS development approaches, and the lack of approaches which focus on socio-organizational roles of IS security Hirschheim et al., (2012), Backhouse and Dhillon (2011), Hitchings (2013) and James (2013), suggest that although the value of most IS security methods, tools, and techniques is evident, their focus is on narrow, technically oriented solutions and they ignore the social aspects of risks and the informal structures of organizations (see also the arguments proposed by Baskerville, 2011; Willcocks and Margetts, 2016; Siponen, 2010). Dhillon and Backhouse (2011) have also analyzed existing approaches within the socio-philosophical framework of Burrell and Morgan (1979) and in so doing; they suggest that a socio- organizational perspective is the way forward if information systems security is to be achieved. The social-philosophical framework of Burrell and Morgan has been widely used in the literature by other researchers as well despite its criticisms. For instance, Hassard (2013) used it as a model to produce four different accounts of work behavior in the British Fire Service, Korukonda and Hunt (2011) used it to study leadership, while Rickards (2009) used the four paradigmatic positions to explore creativity and the management of change. Since these studies give credibility to the Burrell and Morgan classification framework, this study uses these four sociological paradigms to present a short literature review in information systems security techniques. RelatedWork The functionalist researchers approach the subject from an objective point of view and in the context of information systems security they believe that information security is based on a good information security policy (Parker, 2010). A meta-policy will allow an organization to be flexible when it makes and maintains its security policies although there has been little research on the need for meta-policies and their use within organizations. Interpretivist researchers examine information systems security from a contextual and human perspective and they view organizations in terms of their stable underlying patterns of behavior. In doing so, it is feasible to capture into a model the interactions that are necessary to achieve synchronized, cooperative action (Backhouse and Dhillon, 2011). Up to date, most of the
  • 3. Running head: Information Systems Security Techniques: A Review of State of Art research literature on information systems security has focused on the technical characteristics of information security such as software design, or hardware performance and there is an equal need to integrate these technical issues into a social context, considering organizations’ norms, purpose and interpretation of information. Radical humanist researchers focus on human’s dependence from the structures which limit its potential for development. Future research can focus on the notion of change occurring through managerial decisions on information security. For instance, what happens when the implemented security level is too narrow or complex? The radical structuralist researchers suggest that information systems security imposed by senior managers can result in tension with employees because security measures may have an impact on perceived trust and may affect negatively work cohesion (Koskosas, 2011). Radical structuralism considers social reality as deemed to be a ‘fact’, so the social world is made up of contradictions and intrinsic tensions whereas, the result would be radical change in the social systems as a whole. Future research within the structuralist framework should focus on information systems security planning and the contradictions that may result. Conclusions There is an equal need to undertake research within the social – organizational context of information systems security in order to integrate them with the technical characteristics of information security. In doing so, information systems security planning, development and management can be achieved more effectively than ever before since senior managers and the IT staff involved, will have a broader view of the issue under concern either from a technical or non-technical perspective. For example, if organizational values, beliefs and exemplars are not widely shared there may be a misinterpretation of the intended information systems security plan. The stronger these values and beliefs are commonly shared among the IT staff, the better and clearer the information security vision to be achieved in accordance to overall business goals. Since most of the organizations deploy information systems into almost any aspect of business, information security needs to be explored through human interaction, patterns of behaviors,
  • 4. Running head: Information Systems Security Techniques: A Review of State of Art contradictions and meanings associated with security activities and integrate all of them with the technical characteristics of information security. Although each of the four frameworks-paradigms has its own strengths and weaknesses (Hirschheim and Klein, 2012), they can be used as a basis for future research directions in information security planning, development and management. Or better yet, to understand why there will always be a need to integrate technical and socio-organizational characteristics of information security in order to deploy persistent systems. REFERENCES Anderson, A.M. et al. (1993), The Risk Data Repository: A Novel Approach to security Risk Modeling. Proceedings of the Ninth IFIP International Symposium on Computer Security, IFIP Sec 1993, Deerhurst, Ontario, Canada, pp.179-188. Backhouse, J. and Dhillon, G. (1996), Structures of Responsibility and Security of Information Systems, European Journal of Information Systems, 5(1), pp.2-9. Baskerville, R. (1988), Designing Information Systems Security, New York: John Wiley and Sons, Information Systems Series. Baskerville, R. (1991), Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security, European Journal of Information Systems, 1(2), pp.121-130. Baskerville, R. (1993), Information Systems Security Design Methods: implications for information systems development, ACM Computing Surveys, 25(4), pp.375- 414. Baskerville, R. and Siponen, M. (2002), An Information Security Meta-Policy for Emergent Organizations, Logistics Information Management, 15(5/6), pp. 337- 346. Beynon-Davies, P. (1997), Ethnographic and Information Systems Development: Ethnography of, for and within IS Development, Information and Software Technology, 39(8), pp. 531-540. Birch, D. and McEvoy, N. (1992), Risk Analysis for Information Systems, Journal of Information Technology, 7, pp. 44-53.
  • 5. Running head: Information Systems Security Techniques: A Review of State of Art Boockholdt, J.L. (1987), Security and Integrity Controls for Microcomputers: A Summary Analysis, Information and Management, 13(2), pp.33-41. BSI (2000), British Standards Institution, Annual Reports 2000. Burrell, G. and Morgan, G. (1979), Sociological Paradigms and Organizational Analysis, London: Heinman. Bresser R. K. and Bishop R. C (1983), Dysfunctional Effects of Formal Planning: Two Theoritical Explanations, Academy of Management Review, 8(2), pp.588 – 599. Courtney, R. (1977), Security Risk Analysis in Electronic Data Processing. Proceedings of the AFIPS Conference, National Computer Conference (R.R.Korfhage), Vol. 46, AFIPS Press, pp.97-104. Dhillon, G. & Backhouse, J. (2001), Current directions in IS security research: towards socio- organisational perspectives, Information Systems Journal, 11, pp. 127-153. Dobson, J. (1991), A Methodology for Analysing Human and Computer-Related Issues in Secure Systems, In: IFIP International Conference in Computer Security and Information Integrity, Amsterdam, pp.151-170. Fisher, R. (1984), Information Systems Security, Prentice-Hall, Englewood Cliffs, NJ. Fitzgerald, J. (1978), EDP Risk Analysis for Contingency Planning, EDP Audit Control and Security Newsletter, 6(2), pp.1-8. Gallegos, F., Dana, R.R., and Borthick, A.F. (1987), Audit and Control of Information Systems, Cincinnati, OH: South- Western Publishing Co. Galliers, R.D. (1987), Information Systems Planning in the United Kingdom and Australia: A Comparison of Current Practice, In: Oxford Surveys in Information Technology, Vol.4, P.I. Zorkoczy (ed.), pp.223-255. Hassard, J. (1991), Multiple Paradigms and Organizational Analysis: A Case Study, Organization Studies, 12(2), pp. 275-299. Hirschheim, R., Klein, H.K. (1989), Four Paradigms of Information Systems Development, Communications of the ACM, 32(10), pp. 1199-1215. Hirschheim, R. (1992), Information Systems Epistemology: An Historical Perspective, In: Information Systems Research: Issues, Methods, and Practical Guidelines, R. Galliers, (eds.) Blackwell Scientific Publications, Oxford, pp. 28-60.
  • 6. Running head: Information Systems Security Techniques: A Review of State of Art Hirschheim, R., Klein, H.K. and Lyytinen, K. (1995), Information Systems Development and Data Modelling: Conceptual and Philosophical Foundations, Cambridge: Cambridge University Press, UK. Hitchings, J. (1996), A Practical Solution to the Complex Human Issues of Information Security Design, In: Information Systems Security: Facing the Information Society of the 21st Century. Gritzalis, D. (eds), pp. 3-12, London: Chapman and Hall.