Tuesday, April 28, 2020
Information Security Users Responsibility
Introduction Many studies indicate that employees, who deal with day-to-day information, are the cause for at least half of the security breaches experienced within a company. In several studies, users are portrayed as being the weakest link in security issues. They can decide to be the security problem or the solution (Spears Barki, 2010).Advertising We will write a custom research paper sample on Information Security: Userââ¬â¢s Responsibility specifically for you for only $16.05 $11/page Learn More Herath and Wijayanayake (2009) assert that promoting good end-user behaviour, as well as restricting inappropriate end-user behaviour account for effective security of information. As such, they are essential in each and every company. In the year 2005, Dââ¬â¢Arcy and Hovaw (2007) conducted a research to gain insights into employeesââ¬â¢ awareness of four principal security countermeasures. These were security awareness programs, security policies , computer monitoring, and preventive security software, as well as their constraining effect on usersââ¬â¢ intentions with regard to misuse of IS. Security policies aim at providing detailed guidance of acceptable use of organizational IS resources to users (Dà rcy Hovaw, 2007). The study proposed that complementary technical and procedural control are essential in imparting knowledge on employees, regarding their responsibilities in an organizationââ¬â¢s information resources. The control is also vital in deterring the intentions of employees in misusing computer systems. Thus, awareness, training, motivation, and monitoring are vital strategies that play a leading role in protecting organizations, and attracting the attention of employees from violation of security measures.à Information specialists believe that promotion of good end behaviour and constraint of bad end user behaviour are important components of effectiveness in Information Security Management System (I SMS) ((Herath Wijayanayake, 2009). In order to implement effective information security systems, there is a need to fully understand security-related risks and implement appropriate controls to these risks. Employees who apply controls in a remarkable manner enhance security of information within an organization. However, many employees do not understand the value of implementing the controls, and thus end up creating security risks. Others do it out of ignorance, and a large group of employees do it willingly. This research proposes to look into the role of employees in information security maintenance.Advertising Looking for research paper on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More Problem statement The purpose of this project is to investigate the role played by information users in information security management (Dââ¬â¢Arcy Hovav, 2007). It proceeds from the premise that employees account for most of the br eaches of IS experienced in companies. This is most likely caused by the online value system, which lays emphasis on openness and information sharing. Furthermore, many users do not have up-to-date information on browsers, applications, as well as operating systems. Research questions Why do employees cause most of the security breaches in organizations? What is the main responsibility of end-users in information security? Why do employees engage in security-related risks that lead to breach of information security in the contemporary world? What are the predisposing factors to the employeesââ¬â¢ cause of security breaches? These questions are relevant to this research because they revolve around the quality of service for end- users and employees. In order to assess the issues comprehensively and gather data, qualitative data is extremely vital. Gathering information on the key responsibilities of end- users in the security of information is crucial as it helps in gathering in sights on how to include end- users more. End- users have more experience in information security as they interact with the information directly (Herath Wijayanayake, 2009).à Companies and organizations should make efforts to assess and evaluate why employees often engage in risks related to security. In this case, the target is the employees and gathering such information helps to implement improved strategies for information protection (Spears Barki, 2010). Such information and data can only be gathered using qualitative research methods. Breach of information in an organization is an extremely grave issue. It is also vital that organizations protect their information as it is their vital strength.à Assessing the predisposing factors that make employees in organizations breach information is a principal thing. The targets to gather this information from are employees. This can successfully be accomplished through qualitative methods of research. In most cases, they breach in formation because of inadequate motivation. Consequently, the management in the organization should implement strategies to ensure that their employees are adequately motivated (Dââ¬â¢Arcy Hovav, 2007). In order to gather information on the stated questions, several methods can be used, these include participant observation, direct observation, unstructured interviewing, and case studies. In a case study, a company is selected and its end- users and employees studied on how they behave towards information security (Spears Barki, 2010).Advertising We will write a custom research paper sample on Information Security: Userââ¬â¢s Responsibility specifically for you for only $16.05 $11/page Learn More Participant observation, direct observation, and unstructured interviewing are vital tools as the employees are usually not aware that they are being studied. Therefore, the information obtained is highly valid and of high quality. Combining more than o ne method of data collection is vital in ensuring credibility and validity. Most of these methods allows the person gathering data to observe body language, as well. Therefore, information that is not said by word of mouth is also gathered. References Dââ¬â¢Arcy, J., Hovav, A. (2007). Deterring Internal Information Systems. Misuse. Communications of the ACM, 50 (10), 12- 45. Herath, M. P. S., H., Wijayanayake, W. I. (2009). Computer misuse in the workplace. Journal Of Business Continuity Emergency Planning, 3(3), 259-270. Spears, J. L., Barki, H. (2010). User Participation in Information Systems Security Risk Management. Mis Quarterly, 34(3), 503-A5. This research paper on Information Security: Userââ¬â¢s Responsibility was written and submitted by user Emmett Hewitt to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.