Information Technology Research Methods Report: Security Analysis

Verified

Added on  2022/09/15

|6
|731
|18
Report
AI Summary
This report delves into information technology research methods, specifically focusing on the critical aspects of information security. It examines the impact of end-user behavior on security effectiveness, highlighting that technology alone is insufficient without a trained and aware workforce. The report analyzes various research papers, including studies on mobile device security, the Security Behavior Intentions Scale (SeBIS), and the influence of security awareness on user behavior. It explores the risks associated with mobile device loss and theft, emphasizing the need for countermeasures. Furthermore, the report references studies utilizing motivation theory and health belief models to understand and influence user security practices. The overall conclusion emphasizes the importance of understanding human perception of threats and controls to induce responsible security behaviors, particularly in the context of the internet and mobile devices, where data breaches are prevalent. The report aims to provide insights into how organizations can enhance their information security by addressing both technological and human factors.
Document Page
Running head: INFORMATION TECHNOLOGY RESEARCH METHODS
INFORMATION TECHNOLOGY RESEARCH METHODS
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION TECHNOLOGY RESEARCH METHODS
Information Security
Creation of policies, guidelines and standards of information security is beginning of
effective program of information security. A role is played by technology however is not
effective as trained work force. In the paper by Banfield (2016), it is suggested through abundant
research that critical role is played by individual users in information systems’ security as well as
no solution could be based in technology solely. End users are plagued continuously by social
engineering, despite existence of information as well as countermeasures which help promote
appropriate security behavior.
As the mobile devices are used widely for personal along with business purpose, theft and loss of
mobile devices have become a major security threat. In the paper by Tu and Yuan (2012),
potential risks for theft and loss of mobile devices are analyzed and countermeasures are
summarized which could be coped with the risks. Authors Egelman, Harbach and Peer in 2016
performed three experiments in 2016 for identifying correlations among each of four sub scales
of SeBIS and relevant security behaviors of computer. Information security’s many specialists
believe promoting all good behaviors of end user as well as constraining bad behaviors of end
user give one essential method to make information security much more effective in
organizations (Stanton, et al., 2005).
The article by authors Hanus, Wu (2016) uses motivation theory for studying impact of
awareness of information security on security behavior of desktop. Klein and Luciano in 2016
developed theoretical model along with hypotheses for understanding extend of human
perception for threat, and control could induce behavior. Internet is huge network which have
great potential for breaches of information security. Different methods are used by hackers for
Document Page
2INFORMATION TECHNOLOGY RESEARCH METHODS
changing confidentiality, availability and integrity of information (Safa, et al., 2015). The study
by Ng, Kankanhalli and Xu (2009) uses Health Belief Model that is adapted from healthcare
literature for studying security behavior of computer of user.
Document Page
3INFORMATION TECHNOLOGY RESEARCH METHODS
References
Banfield, J. M. (2016). A study of information security awareness program effectiveness in
predicting end-user security behavior.
Egelman, S., Harbach, M., & Peer, E. (2016, May). Behavior ever follows intention? A
validation of the Security Behavior Intentions Scale (SeBIS). In Proceedings of the 2016
CHI conference on human factors in computing systems (pp. 5257-5261).
Hanus, B., & Wu, Y. A. (2016). Impact of users’ security awareness on desktop security
behavior: A protection motivation theory perspective. Information Systems
Management, 33(1), 2-16.
Klein, R. H., & Luciano, E. M. (2016). What influences information security behavior? A study
with Brazilian users. JISTEM-Journal of Information Systems and Technology
Management, 13(3), 479-496.
Ng, B. Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A
health belief perspective. Decision Support Systems, 46(4), 815-825.
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015).
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, 65-78.
Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security
behaviors. Computers & security, 24(2), 124-133.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION TECHNOLOGY RESEARCH METHODS
Tu, Z., & Yuan, Y. (2012, January). Understanding user's behaviors in coping with security
threat of mobile devices Loss and theft. In 2012 45th Hawaii International Conference
on System Sciences (pp. 1393-1402). IEEE.
Document Page
5INFORMATION TECHNOLOGY RESEARCH METHODS
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]