logo

Information Technology Research Methods Article 2022

   

Added on  2022-09-15

6 Pages731 Words18 Views
Running head: INFORMATION TECHNOLOGY RESEARCH METHODS
INFORMATION TECHNOLOGY RESEARCH METHODS
Name of the Student:
Name of the University:
Author Note:

INFORMATION TECHNOLOGY RESEARCH METHODS1
Information Security
Creation of policies, guidelines and standards of information security is beginning of
effective program of information security. A role is played by technology however is not
effective as trained work force. In the paper by Banfield (2016), it is suggested through abundant
research that critical role is played by individual users in information systems’ security as well as
no solution could be based in technology solely. End users are plagued continuously by social
engineering, despite existence of information as well as countermeasures which help promote
appropriate security behavior.
As the mobile devices are used widely for personal along with business purpose, theft and loss of
mobile devices have become a major security threat. In the paper by Tu and Yuan (2012),
potential risks for theft and loss of mobile devices are analyzed and countermeasures are
summarized which could be coped with the risks. Authors Egelman, Harbach and Peer in 2016
performed three experiments in 2016 for identifying correlations among each of four sub scales
of SeBIS and relevant security behaviors of computer. Information security’s many specialists
believe promoting all good behaviors of end user as well as constraining bad behaviors of end
user give one essential method to make information security much more effective in
organizations (Stanton, et al., 2005).
The article by authors Hanus, Wu (2016) uses motivation theory for studying impact of
awareness of information security on security behavior of desktop. Klein and Luciano in 2016
developed theoretical model along with hypotheses for understanding extend of human
perception for threat, and control could induce behavior. Internet is huge network which have
great potential for breaches of information security. Different methods are used by hackers for

INFORMATION TECHNOLOGY RESEARCH METHODS2
changing confidentiality, availability and integrity of information (Safa, et al., 2015). The study
by Ng, Kankanhalli and Xu (2009) uses Health Belief Model that is adapted from healthcare
literature for studying security behavior of computer of user.

End of preview

Want to access all the pages? Upload your documents or become a member.