Information systems security research agenda: Exploring the gap between research and practice

2021 ◽  
Vol 30 (4) ◽  
pp. 101693
Author(s):  
Gurpreet Dhillon ◽  
Kane Smith ◽  
Indika Dissanayaka
Author(s):  
Ken H. Guo

Knowledge is one of the critical factors that organizations need to consider when managing the security of resource management systems or information systems in general. This is because knowledge is not only the subject but also a tool of IS security management. On the one hand, IS security is about the security of knowledge (including data and information). On the other hand, IS security management is a knowledge-intensive activity that depends heavily on IS professionals’ expertise and skills and end user awareness. Given the important role of knowledge, this chapter aims to review current security research by applying knowledge management concepts and frameworks as a tool and lens. Based on the systemic review, this chapter identifies gaps in the current information systems security literature and provides some guidelines for future research and security practices.


Author(s):  
Kimberley Dunkerley ◽  
Gurvirender Tejay

As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.


2010 ◽  
Vol 6 (3) ◽  
pp. 31-41 ◽  
Author(s):  
Kimberley Dunkerley ◽  
Gurvirender Tejay

As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.


2020 ◽  
Vol 4 (3(12)) ◽  
pp. 1-15
Author(s):  
Samira Ilgarovna Proshkina ◽  

The work is devoted to an urgent problem — the study of the evolutionary dynamics of web advertising, its assessment and effectiveness, as well as the problem of legal support and security of information systems. The goal is a systematic analysis of web advertising in an unsafe information field, its relevance and criteria for assessing marketing efforts, minimizing risks, maximizing additional profits and image. Research hypothesis — the effectiveness of web advertising is determined by the form of advertising, place of display, location of the block, model of calculation of the advertising campaign. An approach based on the establishment of preferences, partnership between the state and business structures is emphasized. It takes into account the COVID-19 pandemic, a slowdown in the pace and features of the evolution of business companies in self-isolation. The subtasks of influence on the advertising efficiency of the site’s features and web advertising are highlighted. A comprehensive analysis of information and logical security and computational models of web advertising companies was also carried out.


Author(s):  
Steffi Haag ◽  
Mikko Siponen ◽  
Fufan Liu

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.


Sign in / Sign up

Export Citation Format

Share Document