A Critical assesment if IS Security Research Between 1990 - 2004
نویسندگان
چکیده
This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers contained no theory. In addition, almost 1000 of the papers were categorized as ‘subjective-argumentative’ in terms of methodology, with field experiments, surveys, case studies and action research accounting for less that 10% (8.10%) of all the papers. Fifty nine research topics were identified with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas.
منابع مشابه
A Critical Assessment of IS Security Research between 1990-2004
This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 IS security papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers contained no theory. In addition, almost 1000 of the papers were categorized as ‘subjec...
متن کاملSeismic Vulnerability Assesment of Jacket Type Offshore Platforms
Most of oil and gas offshore platforms are located in the seismic regains. So, Seismic vulnerability evaluation of the offshore platforms is one of the most important and vital issues in the structural systems. In this study, jacket type offshore platforms are studied by incorporating the pushover analyses and nonlinear time history analyses, in such a way that, first some push over analyses ar...
متن کاملTools for Critical Systems Development with UML (Tool Demo)
The high quality development of critical systems (be it dependable, security-critical, real-time, or performance-critical systems) is difficult. Many critical systems are developed, deployed, and used that do not satisfy their criticality requirements, sometimes with spectacular failures. UML offers an opportunity for high-quality critical systems development that is feasible in an industrial c...
متن کاملCritical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملAnalysing Information Systems Security
The paper describes problems with managing information systems security, due to its complexity and broad scope. Then, a security taxonomy is presented and discussed. The taxonomy is used in conjunction with different approaches to information security analysis, including the evaluation of different cost-benefit criteria. The paper also uses the terms proactive and reactive analysis as a way of ...
متن کامل