scholarly journals Systems Security Research at Politecnico di Milano

Author(s):  
Federico Maggi ◽  
Stefano Zanero
Author(s):  
Steffi Haag ◽  
Mikko Siponen ◽  
Fufan Liu

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.


2012 ◽  
Vol 27 (4) ◽  
pp. 285-300 ◽  
Author(s):  
Carleen F Maitland ◽  
Herschel F Thomas (Trey) ◽  
Louis-Marie Ngamassi Tchouakeu

Using an organizational informatics approach, this study explores the implications of human rights organizations’ use of censorship circumvention technologies. Through qualitative analyses of data collected through in-depth interviews, the research examines the factors influencing the use of circumvention technologies and the organizational effects of their use. The outcomes include a revised model of censorship circumvention technology use as well as a new model situating human rights organizations and their audiences in bidirectional information flows. The research provides recommendations for practice as well as insight for organizational informatics and information systems security research in the areas of protective technologies, awareness, detection, and physical security.


Author(s):  
Ken H. Guo

Knowledge is one of the critical factors that organizations need to consider when managing the security of resource management systems or information systems in general. This is because knowledge is not only the subject but also a tool of IS security management. On the one hand, IS security is about the security of knowledge (including data and information). On the other hand, IS security management is a knowledge-intensive activity that depends heavily on IS professionals’ expertise and skills and end user awareness. Given the important role of knowledge, this chapter aims to review current security research by applying knowledge management concepts and frameworks as a tool and lens. Based on the systemic review, this chapter identifies gaps in the current information systems security literature and provides some guidelines for future research and security practices.


Author(s):  
Xin Luo ◽  
Qinyu Liao

In computer virology, advanced encryption algorithms, on the bright side, can be utilized to effectively protect valuable information assets of enterprises. Yet, on the dark side, they can also be of use for malicious attackers to conduct pernicious activities. This article attempts to discover the surreptitious features of ransomware and to address it in information systems security research. It intends to elicit attention from enterprises with regard to ransomware—a newly emerged cyber hackjacing threat using such encryption technology as RSA—and to help both academic researchers and IT practitioners understand the technological characteristics of ransomware, along with its severity analysis. As ransomware infections continue to rise, and attacks employing refined algorithm become increasingly sophisticated, data protection faces serious challenges. This chapter draws a ransomware extortion scheme, compares ransomware with other malware, and discusses future trends and research directions in an effort to cater to both practitioners and researchers.


Author(s):  
M. Almgren ◽  
Z. Fu ◽  
E. Jonsson ◽  
P. Kleberger ◽  
A. Larsson ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document