A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation

نویسندگان

  • Jeffrey May
  • Gurpreet Dhillon
چکیده

Past literature has indicated the need for addressing information security from both the social and technical perspective. However, previous research has lacked in providing any clear direction for how these two perspectives can be brought together in a coherent or holistic manner to analyze information security in an organization. Thus, this paper develops a conceptual framework for identifying, bringing together, and interpreting the deep-rooted social and technical issues that pertain to information systems security. The framework is grounded in semiotics and is validated by the analysis of a specific case study. Findings in this research indicate that the social and technical elements of security can be brought together in a holistic manner via six layers of abstraction where each layer addresses deep-rooted issues that pertain to information security. The output of each layer is then used to inform other layers in a collaborative manner creating a final product that contains elements for enriching security analysis and enhancing security policy formation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور

Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

Comparative Advantage, Self-sufficiency and Food Security in Iran: Case Study of Wheat Commodity

Food security has a dynamic notion during the time and may be affected by various domestic and global factors.Nevertheless, Iranian policy makers consider food security as same as self-sufficiency in agricultural food products, particularly wheat production. However, self-sufficiency can contribute to food security only if it is in coincidences with comparative advantage and sustainable resourc...

متن کامل

Gender Analysis of Social Security Policies in Post- Revolutionary Iran

Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the  gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010