logo

CSIS 341-Security Policy on Internet Usage

6 Pages2645 Words267 Views
   

Liberty University

   

Internet Usage Policy (CSIS 341)

   

Added on  2020-03-07

About This Document

The main purpose of this report is to present a literature view on the Security policy in a research manner. This literature throws light on present security policies that are being implemented in the organization for the employees in Internet Usage Policy. Security policy can be defined as a policy that means to be secure for an organization, system, or any other entity.

CSIS 341-Security Policy on Internet Usage

   

Liberty University

   

Internet Usage Policy (CSIS 341)

   Added on 2020-03-07

ShareRelated Documents
Assignment 2 Details3.2. ASST 2 TemplateResearch Report TemplateSecurity Policy (Internet Usage Policy) - Research ReportStudent NameStudent NumberE-mail AddressABSTRACTFor this new world of technology most confronting security threat for an organization is the Internet Security risks which generally result from the non-compliance with Internet Usage Policy (IUP) of the employees of that organization. Many earlier studies made by different authors, researchers and writers on the security policies had ignored the intrinsic motivation impact on thecompliance intentions of the employees. This report focuses on the theoretical approaches on the compliance of Security policy in an organization regarding the Internet Usage policy and considered the behaviour and reaction of the employees on these policies. Total ten peer-reviewed journals have been chosen from the scholar which were appropriate and relevance to the topic and based on their theories new theory have been proposed in this paper including all the objectives which were important and relative to this topic. Based on the findings made by thisliterature review, organizational justice influences IUP compliance intention directly and also indirectly by fostering ethical objections against the abuses that are possible while using internet.Keywords:Security policy, Internet Usage Policy, Information Security Policy
CSIS 341-Security Policy on Internet Usage_1
INTRODUCTIONThe main purpose of this report is to present a literature view on the Security policy in a researchmanner. This literature throws light on present security policies that are being implemented in theorganization for the employees in Internet Usage Policy. Security policy can be defined as a policy which means to be secure for an organization, system or any other entity. Security policy in an organization refers to the constraints on the behavior of the members of the organization including the constraints that are imposed on adversaries by certain mechanisms (Peltier 2016). To make this topic clearer, this can be compared with the locks, keys, walls and doors.METHODOLOGYTen scholarly articles were chosen among the articles (2012 – 2017) at Google Scholar. Some ofarticles were chosen by searching ‘Internet Usage Policy’ under which some basics were find about the internet and its usage policy then searched for the ‘awareness for security policy among internet users. Next objective was to search for ‘Security Policy Compliance’ in which several articles were popped out with titles information security compliances then some peer-reviewed journals were selected among them to make this report an evidence-full research report. Some books were also listed in that list but to make clearer only research papers are being selected to present this report, which are peer-reviewed by several other writers or authorsor researchers. LITERATURE REVIEWBertot, Jaeger and Hanses (2012) wrote a paper under title “Government Information Quarterly” in which they discusses about the issues, recommendations and challenges of the impacting policies on use of Social Media by Government. Main focus in this paper was to analyze differentpolicies on the using internet by government. First of all a relation was proposed between government and social media in the implication, benefits, and dis-benefits were explained but more or less benefits were major concern (Bertot, Jaegar and Hanses 2012). Then it compares the policies or laws that were implemented on the employee for the use of internet. Various acts were also explained in the paper to make justification whether the security policies are relevant or not in this case. There was also a description table proposed by authors in order to relate policy instrument, policy type and their descriptions which can be considered while concluding that although, in manner to extend the services of the government different agencies are increasing social media and other communication means by using internet (Bertot, Jaegar and Hanses 2012). Further engage members of the public in government efforts, reach individuals, and offer government information, is a large part of the system. In order to make this happen there is a need of antiquated policy structure that can establish the parameters for the flows, access, and dissemination of information. Luiijf, Besseling and De Graaf (2013) researched on the cyber security strategies (NCSS) published by a set of nations. Same set of cyber security threats were proposed by each country but writers found that approaches made and the view of point of each country was different from others. Paper was based on the analysis of NCSS proposed by 19 countries including Australia and other developed and developing countries (Shafqat and Masood 2016). Comparisons between NCSS of all 19 countries have also been proposed in this paper. Based on the NCSS analysis and comparison writers concluded that many proposed NCSS were not clear in relating
CSIS 341-Security Policy on Internet Usage_2
NCSS with the pre-existing international and national policies like European Digital Agenda, CIP, and National Security Policy. Based on the proposals, they also recommended that NCSS shouldbe explained in detail regarding the topic “International Collaboration” (Luiijf, Besseling and De Graff 2013). Another article was proposed by Li ET al. (2014) in which writers has shown the effects of personal ethics and other policies regarding the internet use compliance in the organization. The paper was started with a research on the security policy compliance considering the prevalence of using internet in the workplace which was the prior objective of thispaper. Several theoretical hypothesis and foundations were expressed in the paper with introducing approaches like IUP (Internet Usage Policy) compliance and self-regulatory approach, IUP compliance and command-and-control approach (Li et al. 25014). This research paper was full of evidences with various appropriate methodologies which helped in concluding that considering both intrinsic and extrinsic motivational factors, IUP compliance needs integrative understanding which writers have no doubt provide to the readers by their successful research. Akman and Mishra (2015) discussed in their paper about the “Predictive effect of gender and sector differences on Internet Usage among employees” in which they have introduced all individuals as the key to use internet not the technology. This paper was based on several research papers and literatures of various scholar articles and maximum of them were peer-reviewed which made the paper less doubtful and more evidence proved. Research was introduced regarding the gender and internet usage among them and final result was drawn by investigating five hypotheses at significance level of 5% (Akman and Mishra 2015). Based on thisresult they had concluded that the “gender” which was a variable for the research had significant impact on “Internet usage for communication services and for information services” amongst rest of the empirical variables used in the report. Abawajy (2014) proposed an article emphasising on the awareness about the cyber security among the employees of an organization or common people who are using internet for the communication and information purpose. This paper was based on the issues related to the security after the implementation of information security programmes in the organizations providing evidence of phishing attacks and different cyber-attacks which can prey any organization (Abjay 2014). This paper provided two issues related to the security awareness programmes which were delivery approaches, effective in raising awareness about information security programme among the people and the method which is proper to be delivered by internet users. This paper helps in understanding that in order to empower people about the security awareness on the internet use training can be powerful measure for them (Abjay 2014). Video presentation is suggested as the most appropriate for the delivery of training among the internet users and aware them about the security policies among the employee of an organization and common people. Today’s best medium for using internet by an individual is using smartphone or any mobile device and popular software is android (Wang, Xiang and Fesenmaier 2016). Ongtang et al. (2012) proposed an article regarding the policies that can be implemented for the security policies for the internet users in android. Basically the focus of this paper was on the operating system used by internet users in various mobile devices and comparing them with the android. A saint framework was proposed by authors which addresses the limitations of Android security install-time permission-granting policies and inter-application communication policies (Ongtang et al. 2012). They emphases on the need to adopt saint framework by the real-world is the integration of several more applications and policies which arerequired in the systems. Lowry et al. (2015) expressed their intentions about the security policies for an organization to protect sensitive data about the organization. This report introduced the
CSIS 341-Security Policy on Internet Usage_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business Research - Literature Review
|9
|2148
|18

Report on Hand Hygiene Articles
|15
|3962
|69

ICT615 Information Technology Research Methods
|2
|601
|154

Introduction to leadership and management assignment
|12
|2859
|127

Opportunities and problems of social electronic commerce
|7
|1411
|30

IT Project Management- Research Methods
|15
|2780
|247