Values for Information System Security in an Academic Environment: A Pilot Study
نویسنده
چکیده
In this paper we present a process of identifying individual and organizational values within an academic environment. These values have been identified by using Value Sensitive Approach (VSA) in the area of Information System Security (ISS). VSA is a methodological framework for identifying organizational and individual values. We believe that ISS objectives and ISS strategy suitable for each specific type of organization can be decided by eliciting these values. The study resulted in a number of value areas related to university general issues (UGV) and ISS issues important within an academic environment. The UGV and the ISS values can be further analyzed and transformed into ISS objectives suitable within an academic environment. Furthermore the identified values should be considered when ISS strategy to achieve those objectives is decided. Results presented in this paper will contribute to the ongoing research efforts to view security problems from a more holistic, socio-organizational perspective.
منابع مشابه
The effect of developing the dynamics of library software system on information security management (Case study: Libraries of Islamic Azad universities of the country)
Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Uni...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملProposed Pilot Pattern Methods for Improvement DVB-T System Performance
Recently, orthogonal frequency division multiplexing (OFDM) has been extensively used in communications systems to resist channel impairments in frequency selective channels. OFDM is a multicarrier transmission technology in wireless environment that use a large number of orthogonal subcarriers to transmit information. OFDM is one of the most important blocks in digital video broadcast-terrestr...
متن کامل