Critical Security Issues and Solutions for Organizational IT Systems
VerifiedAdded on  2023/05/29
|12
|2972
|235
Report
AI Summary
This report provides a comprehensive analysis of security issues in organizational IT systems. It begins by defining information technology systems and highlighting their advantages, such as better communication, cost-effectiveness, higher productivity, and easy availability. The report then delves into various security issues, including identity theft, phishing, physical damage, spamming, hacking, jamming, malicious software, lack of encryption, and inadequate security technology. Each issue is explained in detail, emphasizing its potential impact on organizational data and operations. Finally, the report proposes several solutions to mitigate these security risks, such as implementing antivirus software, using firewalls, employing encryption techniques, and using updated passwords. The report concludes by underscoring the importance of addressing these security issues to ensure the efficiency and effectiveness of organizational IT systems. Desklib is a platform where students can find this and similar assignments for study purposes.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: SECURITY ISSUES IN IT SYSTEMS
Security Issues in Organizational IT Systems
Name of the Student
Name of the University
Author’s Note:
Security Issues in Organizational IT Systems
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
SECURITY ISSUES IN IT SYSTEMS
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Information Technology Systems..........................................................................................2
Advantages of Organizational IT Systems.............................................................................3
Security Issues in Organizational IT Systems........................................................................4
Probable Solutions for Solving the Security Issues...............................................................7
Conclusion..................................................................................................................................8
References..................................................................................................................................9
SECURITY ISSUES IN IT SYSTEMS
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Information Technology Systems..........................................................................................2
Advantages of Organizational IT Systems.............................................................................3
Security Issues in Organizational IT Systems........................................................................4
Probable Solutions for Solving the Security Issues...............................................................7
Conclusion..................................................................................................................................8
References..................................................................................................................................9

2
SECURITY ISSUES IN IT SYSTEMS
Introduction
IT or Information technology can be stated as the utilization of several systems for the
purpose of storing, retrieving, transmitting as well as manipulation of data as well as
information for any business or enterprise (Laudon and Laudon 2015). This information
technology is subsequently considered as the subset of ICT or information and
communication technology. The several devices that are utilized for aiding computation are
the significant parts of information technology.
There are some of the major and the most important as well as significant benefits of
this information technology for solving all types of issues related to IT systems (Stair and
Reynolds 2013). In spite of having such distinct benefits, there some of the basic and
noteworthy security issues present in the organizational IT systems. These issues are required
to be solved for bringing utmost efficiency and effectiveness of the organizational IT
systems. The following report outlines a brief discussion on the several security issues faced
in the organizational IT systems and the probable solutions for solving these issues.
Discussion
Information Technology Systems
The systems of information technology can be described as the formal and
organizational systems that are being designed for the proper collection, processing,
distributing and storage of information (Davies, Dean and Ball 2013). These types of IT
systems are majorly comprised of four basic components of processes, people, organizational
structures and technologies. The basic focus is provided on the information system for having
a definite boundary, storage, inputs, communication networks, processors and outputs. IT
systems also support the business operations, decision making and management. The various
products as well as services in the economy are closely linked with the information
SECURITY ISSUES IN IT SYSTEMS
Introduction
IT or Information technology can be stated as the utilization of several systems for the
purpose of storing, retrieving, transmitting as well as manipulation of data as well as
information for any business or enterprise (Laudon and Laudon 2015). This information
technology is subsequently considered as the subset of ICT or information and
communication technology. The several devices that are utilized for aiding computation are
the significant parts of information technology.
There are some of the major and the most important as well as significant benefits of
this information technology for solving all types of issues related to IT systems (Stair and
Reynolds 2013). In spite of having such distinct benefits, there some of the basic and
noteworthy security issues present in the organizational IT systems. These issues are required
to be solved for bringing utmost efficiency and effectiveness of the organizational IT
systems. The following report outlines a brief discussion on the several security issues faced
in the organizational IT systems and the probable solutions for solving these issues.
Discussion
Information Technology Systems
The systems of information technology can be described as the formal and
organizational systems that are being designed for the proper collection, processing,
distributing and storage of information (Davies, Dean and Ball 2013). These types of IT
systems are majorly comprised of four basic components of processes, people, organizational
structures and technologies. The basic focus is provided on the information system for having
a definite boundary, storage, inputs, communication networks, processors and outputs. IT
systems also support the business operations, decision making and management. The various
products as well as services in the economy are closely linked with the information

3
SECURITY ISSUES IN IT SYSTEMS
technology like computer software, hardware, electronic commerce, semiconductors, telecom
equipment and many others. The organization utilizes this system for helping the people to
interact with the technology for the purpose of supporting the several business processes. The
proper relationship between business processes, computer systems and information systems is
extremely important for each and every organization (Rainer et al. 2013). Moreover, the
performance of the business operations and processes are also checked and controlled with
the help of information technology systems.
Advantages of Organizational IT Systems
The competitiveness of several organizations is widely based on the efficient as well
as effective utilization of information technology systems. The most significant purpose of
these information systems is to provide the appropriate information to the correct place and
the correct time (Petter, DeLone and McLean 2013). These types of IT systems are solely
utilized for tracking, storing, manipulating as well as distributing the relevant information
from the collected data to the specified individuals whenever required. The organizations get
various significant and important advantages after proper implementation of these systems
within the business. The major and the most significant advantages of the IT systems within
an organization are as follows:
i) Better Communication: The first and the foremost advantage of the IT systems is
the better communication (Galliers and Leidner 2014). Since, these systems provide features
like instant messaging, voice calls, video calls and emails, the entire communication process
becomes extremely easier, quicker as well as cheaper for all organizations.
ii) Cost Effectiveness: The second important and significant advantage of these IT
systems is its cost effectiveness. This type of systems could be easily afforded by each and
every organization and no extra cost is incurred apart from the infrastructure and hardware.
SECURITY ISSUES IN IT SYSTEMS
technology like computer software, hardware, electronic commerce, semiconductors, telecom
equipment and many others. The organization utilizes this system for helping the people to
interact with the technology for the purpose of supporting the several business processes. The
proper relationship between business processes, computer systems and information systems is
extremely important for each and every organization (Rainer et al. 2013). Moreover, the
performance of the business operations and processes are also checked and controlled with
the help of information technology systems.
Advantages of Organizational IT Systems
The competitiveness of several organizations is widely based on the efficient as well
as effective utilization of information technology systems. The most significant purpose of
these information systems is to provide the appropriate information to the correct place and
the correct time (Petter, DeLone and McLean 2013). These types of IT systems are solely
utilized for tracking, storing, manipulating as well as distributing the relevant information
from the collected data to the specified individuals whenever required. The organizations get
various significant and important advantages after proper implementation of these systems
within the business. The major and the most significant advantages of the IT systems within
an organization are as follows:
i) Better Communication: The first and the foremost advantage of the IT systems is
the better communication (Galliers and Leidner 2014). Since, these systems provide features
like instant messaging, voice calls, video calls and emails, the entire communication process
becomes extremely easier, quicker as well as cheaper for all organizations.
ii) Cost Effectiveness: The second important and significant advantage of these IT
systems is its cost effectiveness. This type of systems could be easily afforded by each and
every organization and no extra cost is incurred apart from the infrastructure and hardware.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
SECURITY ISSUES IN IT SYSTEMS
iii) Higher Productivity: Another important and noteworthy benefit of the IT systems
within any organization is that it provides higher productivity to that particular organization
(Panetto and Cecil 2013).
iv) Easy Availability: The fourth vital as well as noteworthy advantage of the
organizational information technology systems is that it makes the business open 24X7
throughout the world. This subsequently means that the business could be open anywhere and
anytime and even makes the business more convenient than any other business.
Security Issues in Organizational IT Systems
Although, organizational IT systems consist of several important and significant
advantages and features that are effective for the respective company (Mason 2017).
However, few security issues are also present within these systems that are required to be
eradicated time for providing utmost efficiency to the business. The most important and
significant issues of organizational IT systems are computer abuse or computer crime. There
are several serious and major effects of computer crime or abuse issues. The respective users
of the information systems solely depend on the systems and hence a smaller set back could
cause major setbacks for that particular organization (Chen et al. 2014). The security issues
of organizational IT systems are as follows:
i) Identity Theft: The first and the foremost security issue in the IT systems is identity
theft. This type of issue occurs when the cyber attacker or hacker impersonates as an
authenticated person for the purpose of practicing any type of malfunction. The identity theft
is done by simply accessing the personal details of that particular authenticated person
(Weaver et al. 2016). These personal data or information involve social security numbers,
passport numbers, confidential organizational data and several others.
SECURITY ISSUES IN IT SYSTEMS
iii) Higher Productivity: Another important and noteworthy benefit of the IT systems
within any organization is that it provides higher productivity to that particular organization
(Panetto and Cecil 2013).
iv) Easy Availability: The fourth vital as well as noteworthy advantage of the
organizational information technology systems is that it makes the business open 24X7
throughout the world. This subsequently means that the business could be open anywhere and
anytime and even makes the business more convenient than any other business.
Security Issues in Organizational IT Systems
Although, organizational IT systems consist of several important and significant
advantages and features that are effective for the respective company (Mason 2017).
However, few security issues are also present within these systems that are required to be
eradicated time for providing utmost efficiency to the business. The most important and
significant issues of organizational IT systems are computer abuse or computer crime. There
are several serious and major effects of computer crime or abuse issues. The respective users
of the information systems solely depend on the systems and hence a smaller set back could
cause major setbacks for that particular organization (Chen et al. 2014). The security issues
of organizational IT systems are as follows:
i) Identity Theft: The first and the foremost security issue in the IT systems is identity
theft. This type of issue occurs when the cyber attacker or hacker impersonates as an
authenticated person for the purpose of practicing any type of malfunction. The identity theft
is done by simply accessing the personal details of that particular authenticated person
(Weaver et al. 2016). These personal data or information involve social security numbers,
passport numbers, confidential organizational data and several others.

5
SECURITY ISSUES IN IT SYSTEMS
ii) Phishing: The second important and noteworthy security issue within the
organizational IT systems is phishing. It is the fraud attempt for the purpose of obtaining
sensitive or confidential information like usernames, passwords as well as credentials of
credit cards by disguising as the trust worthy entity within the electronic communication.
Phishing is majorly spread through emails and it is a type of identity theft.
iii) Physical Damage: The next important security issue or threat to the organizational
IT systems is physical damage (Birks et al. 2013). The loss as well as corruption of data is
extremely common due to such issue in IT systems. Moreover, the infrastructure or hardware
are damaged due to the security issue of physical damage. The security issues could either be
accidental or intentional or could even by caused by the natural disasters.
iv) Spamming: The spamming could be stated as the specific utilization of the
messaging systems for the purpose of sending any type of spam or unsolicited message,
majorly advertising or sending the messages repeatedly on that particular web site. The most
popular as well as significant recognized form of spam is the spamming of electronic mails
(Feng, Wang and Li 2014). However, the spamming is also applied to other media like wiki
spam, instant messaging spam, mobile phone messaging spam, social spam, blogs spam and
several others. The extra costs like fraud and lost productivity are also possible for the
presence of spamming within the organizational IT systems.
v) Hacking: The next subsequent security issue for the organizational IT systems is
hacking. The hacking solely refers to any type of unauthorized or unauthenticated intrusion
into the network or computer. The significant person, who is engaged within any type of
hacking activity is called a hacker (Mishra, Srinivas and Mukhopadhyay 2014). The hacker
might even alter the security features or system features for the core purpose of
accomplishing the goals and objectives, which are different from the original purpose of the
SECURITY ISSUES IN IT SYSTEMS
ii) Phishing: The second important and noteworthy security issue within the
organizational IT systems is phishing. It is the fraud attempt for the purpose of obtaining
sensitive or confidential information like usernames, passwords as well as credentials of
credit cards by disguising as the trust worthy entity within the electronic communication.
Phishing is majorly spread through emails and it is a type of identity theft.
iii) Physical Damage: The next important security issue or threat to the organizational
IT systems is physical damage (Birks et al. 2013). The loss as well as corruption of data is
extremely common due to such issue in IT systems. Moreover, the infrastructure or hardware
are damaged due to the security issue of physical damage. The security issues could either be
accidental or intentional or could even by caused by the natural disasters.
iv) Spamming: The spamming could be stated as the specific utilization of the
messaging systems for the purpose of sending any type of spam or unsolicited message,
majorly advertising or sending the messages repeatedly on that particular web site. The most
popular as well as significant recognized form of spam is the spamming of electronic mails
(Feng, Wang and Li 2014). However, the spamming is also applied to other media like wiki
spam, instant messaging spam, mobile phone messaging spam, social spam, blogs spam and
several others. The extra costs like fraud and lost productivity are also possible for the
presence of spamming within the organizational IT systems.
v) Hacking: The next subsequent security issue for the organizational IT systems is
hacking. The hacking solely refers to any type of unauthorized or unauthenticated intrusion
into the network or computer. The significant person, who is engaged within any type of
hacking activity is called a hacker (Mishra, Srinivas and Mukhopadhyay 2014). The hacker
might even alter the security features or system features for the core purpose of
accomplishing the goals and objectives, which are different from the original purpose of the

6
SECURITY ISSUES IN IT SYSTEMS
respective system. This even refers to the non-malicious activities after the inclusion of
improvised as well as unusual alterations to the processes and equipment.
vi) Jamming: The sixth important and significant security issue for any of the
organizational IT system is jamming. The major purpose for executing the jamming threats is
to find out a specific method for tying up of the lines to the system (Goes 2014). This is done
behind a web site and when the lines are being tied up, the legitimate users could easily
access the web site and hence these lines could be jammed with the illegal users.
viii) Malicious Software: The presence of malicious software within the IT systems is
yet another important security issue for any organization. This type of software provides full
or partial control of the systems for doing anything the creator of malware needs. The
malicious software could either be a virus, Trojan horse, spyware, adware, worm or any other
(Worrell, Di Gangi and Bush 2013). This type of software is responsible for bringing some of
the major and the most significant changes or threats within the organization by stealing the
confidential information or data.
ix) Lack of Encryption: Another important and noteworthy security issue for the
organizational information technology systems is lack of encryption. The protection of
sensitive business data within transit is extremely important and the effectiveness is measured
distinctly. If the data is not protected and does not comprise of encryption, the authenticated
users would loss the data integrity and confidentiality.
x) Inadequate Security Technology: The next important and significant security issue
for the respective organizational IT systems is the inadequate security technology
(Dahlstrom, Walker and Dziuban 2013). The software is responsible for monitoring the
overall network security for becoming a specific growing trend within the enterprise space. It
is designed for sending subsequent alerts as soon as the intrusion attempts are occurring and
SECURITY ISSUES IN IT SYSTEMS
respective system. This even refers to the non-malicious activities after the inclusion of
improvised as well as unusual alterations to the processes and equipment.
vi) Jamming: The sixth important and significant security issue for any of the
organizational IT system is jamming. The major purpose for executing the jamming threats is
to find out a specific method for tying up of the lines to the system (Goes 2014). This is done
behind a web site and when the lines are being tied up, the legitimate users could easily
access the web site and hence these lines could be jammed with the illegal users.
viii) Malicious Software: The presence of malicious software within the IT systems is
yet another important security issue for any organization. This type of software provides full
or partial control of the systems for doing anything the creator of malware needs. The
malicious software could either be a virus, Trojan horse, spyware, adware, worm or any other
(Worrell, Di Gangi and Bush 2013). This type of software is responsible for bringing some of
the major and the most significant changes or threats within the organization by stealing the
confidential information or data.
ix) Lack of Encryption: Another important and noteworthy security issue for the
organizational information technology systems is lack of encryption. The protection of
sensitive business data within transit is extremely important and the effectiveness is measured
distinctly. If the data is not protected and does not comprise of encryption, the authenticated
users would loss the data integrity and confidentiality.
x) Inadequate Security Technology: The next important and significant security issue
for the respective organizational IT systems is the inadequate security technology
(Dahlstrom, Walker and Dziuban 2013). The software is responsible for monitoring the
overall network security for becoming a specific growing trend within the enterprise space. It
is designed for sending subsequent alerts as soon as the intrusion attempts are occurring and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
SECURITY ISSUES IN IT SYSTEMS
only valuable alerts are effective for resolving them. The organizations majorly rely on the
technologies for being completely protected against the security attacks, only when they are
meant to be a managed tool or technique.
Probable Solutions for Solving the Security Issues
The proper management of data is easily done with the information technology. These
data could be of any form like texts, voice, images, audio and many others. The advanced
data management is possible with the help of information technology systems. The above
mentioned issues or threats related to security of the organizational IT systems are extremely
dangerous and vulnerable for the business and the business related data (Laudon and Laudon
2015). There are some of the major and the most significant solutions for each and every
security issue of the IT systems within the organization and these probable solutions are
provided below:
i) Implementation of Antivirus Software: The first and the most effective solution for
the proper removal of all types of security issues within the organizational IT systems is the
effective as well as efficient implementation of antivirus software. This type of software is
also termed as the anti-malware. It is a specific computerized program that is utilized for the
purpose of prevention, detection as well as removal of malware. The major purpose of this
type of software is to detect and remove the computer viruses and it is extremely effective for
all systems.
ii) Implementing Firewalls: The firewall is the network security system, which is
solely responsible for monitoring and controlling of the incoming and outgoing network
traffic on the basis of the previously determined security rules (Galliers and Leidner 2014).
The firewall acts as the barrier within the trusted internal networks and the untrusted external
networks like the Internet connection. The organizational IT systems would be absolutely
SECURITY ISSUES IN IT SYSTEMS
only valuable alerts are effective for resolving them. The organizations majorly rely on the
technologies for being completely protected against the security attacks, only when they are
meant to be a managed tool or technique.
Probable Solutions for Solving the Security Issues
The proper management of data is easily done with the information technology. These
data could be of any form like texts, voice, images, audio and many others. The advanced
data management is possible with the help of information technology systems. The above
mentioned issues or threats related to security of the organizational IT systems are extremely
dangerous and vulnerable for the business and the business related data (Laudon and Laudon
2015). There are some of the major and the most significant solutions for each and every
security issue of the IT systems within the organization and these probable solutions are
provided below:
i) Implementation of Antivirus Software: The first and the most effective solution for
the proper removal of all types of security issues within the organizational IT systems is the
effective as well as efficient implementation of antivirus software. This type of software is
also termed as the anti-malware. It is a specific computerized program that is utilized for the
purpose of prevention, detection as well as removal of malware. The major purpose of this
type of software is to detect and remove the computer viruses and it is extremely effective for
all systems.
ii) Implementing Firewalls: The firewall is the network security system, which is
solely responsible for monitoring and controlling of the incoming and outgoing network
traffic on the basis of the previously determined security rules (Galliers and Leidner 2014).
The firewall acts as the barrier within the trusted internal networks and the untrusted external
networks like the Internet connection. The organizational IT systems would be absolutely

8
SECURITY ISSUES IN IT SYSTEMS
safe and secured from all types of security issues and hence the respective data would be
protected.
iii) Using Encryption: The next important and significant solution for removing the
security issues in the organizational IT systems is the proper utilization of encryption
technique. This is the basic procedure for encoding of an information or message so that only
the authenticated and authorized parties could access them. Hence, the data would be safe and
secured.
iv) Using Updated Passwords: The passwords are yet another effective and efficient
method of solving all types of issues related to security in the organizational IT systems
(Mason 2017). Moreover, the passwords should also be updated in a periodical manner.
Conclusion
Therefore, from the above discussion, conclusion can be drawn that information
technology deals with computing and is majorly involved in the information and systems
transmittal for properly facilitating the communication. The various significant
responsibilities that are required to be fulfilled by the respective information technology
department are quite vital for the respective organization. The major examples of the IT
systems are computers, network structure, phone systems, security systems, software, data
analysis tool, auditing systems, programming languages and various others. Communication
is the major benefit of these types of systems as it makes the entire process of communication
quite easier. Apart from communication, these information technology systems are also
popular for its productivity, better availability and cost effectiveness. The above report has
clearly depicted the several advantages as well as security issues of the respective IT systems.
Moreover, the probable solutions for each and every security issue of these information
technology systems are provided in the report with relevant and appropriate details.
SECURITY ISSUES IN IT SYSTEMS
safe and secured from all types of security issues and hence the respective data would be
protected.
iii) Using Encryption: The next important and significant solution for removing the
security issues in the organizational IT systems is the proper utilization of encryption
technique. This is the basic procedure for encoding of an information or message so that only
the authenticated and authorized parties could access them. Hence, the data would be safe and
secured.
iv) Using Updated Passwords: The passwords are yet another effective and efficient
method of solving all types of issues related to security in the organizational IT systems
(Mason 2017). Moreover, the passwords should also be updated in a periodical manner.
Conclusion
Therefore, from the above discussion, conclusion can be drawn that information
technology deals with computing and is majorly involved in the information and systems
transmittal for properly facilitating the communication. The various significant
responsibilities that are required to be fulfilled by the respective information technology
department are quite vital for the respective organization. The major examples of the IT
systems are computers, network structure, phone systems, security systems, software, data
analysis tool, auditing systems, programming languages and various others. Communication
is the major benefit of these types of systems as it makes the entire process of communication
quite easier. Apart from communication, these information technology systems are also
popular for its productivity, better availability and cost effectiveness. The above report has
clearly depicted the several advantages as well as security issues of the respective IT systems.
Moreover, the probable solutions for each and every security issue of these information
technology systems are provided in the report with relevant and appropriate details.

9
SECURITY ISSUES IN IT SYSTEMS
SECURITY ISSUES IN IT SYSTEMS
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
SECURITY ISSUES IN IT SYSTEMS
References
Birks, D.F., Fernandez, W., Levina, N. and Nasirin, S., 2013. Grounded theory method in
information systems research: its nature, diversity and opportunities. European Journal of
Information Systems, 22(1), pp.1-8.
Chen, H., Hailey, D., Wang, N. and Yu, P., 2014. A review of data quality assessment
methods for public health information systems. International journal of environmental
research and public health, 11(5), pp.5170-5207.
Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013. ECAR study of undergraduate students
and information technology (p. 2013). 2013.
Davies, R.S., Dean, D.L. and Ball, N., 2013. Flipping the classroom and instructional
technology integration in a college-level information systems spreadsheet
course. Educational Technology Research and Development, 61(4), pp.563-580.
Feng, N., Wang, H.J. and Li, M., 2014. A security risk analysis model for information
systems: Causal relationships of risk factors and vulnerability propagation
analysis. Information sciences, 256, pp.57-73.
Galliers, R.D. and Leidner, D.E., 2014. Strategic information management: challenges and
strategies in managing information systems. Routledge.
Goes, P.B., 2014. Design science research in top information systems journals. MIS
Quarterly: Management Information Systems, 38(1), pp.iii-viii.
Laudon, K.C. and Laudon, J.P., 2015. Management information systems (Vol. 8). Prentice
Hall.
Mason, R.O., 2017. Four ethical issues of the information age. In Computer Ethics (pp. 41-
48). Routledge.
SECURITY ISSUES IN IT SYSTEMS
References
Birks, D.F., Fernandez, W., Levina, N. and Nasirin, S., 2013. Grounded theory method in
information systems research: its nature, diversity and opportunities. European Journal of
Information Systems, 22(1), pp.1-8.
Chen, H., Hailey, D., Wang, N. and Yu, P., 2014. A review of data quality assessment
methods for public health information systems. International journal of environmental
research and public health, 11(5), pp.5170-5207.
Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013. ECAR study of undergraduate students
and information technology (p. 2013). 2013.
Davies, R.S., Dean, D.L. and Ball, N., 2013. Flipping the classroom and instructional
technology integration in a college-level information systems spreadsheet
course. Educational Technology Research and Development, 61(4), pp.563-580.
Feng, N., Wang, H.J. and Li, M., 2014. A security risk analysis model for information
systems: Causal relationships of risk factors and vulnerability propagation
analysis. Information sciences, 256, pp.57-73.
Galliers, R.D. and Leidner, D.E., 2014. Strategic information management: challenges and
strategies in managing information systems. Routledge.
Goes, P.B., 2014. Design science research in top information systems journals. MIS
Quarterly: Management Information Systems, 38(1), pp.iii-viii.
Laudon, K.C. and Laudon, J.P., 2015. Management information systems (Vol. 8). Prentice
Hall.
Mason, R.O., 2017. Four ethical issues of the information age. In Computer Ethics (pp. 41-
48). Routledge.

11
SECURITY ISSUES IN IT SYSTEMS
Mishra, D., Srinivas, J. and Mukhopadhyay, S., 2014. A secure and efficient chaotic map-
based authenticated key agreement scheme for telecare medicine information
systems. Journal of medical systems, 38(10), p.120.
Panetto, H. and Cecil, J., 2013. Information systems for enterprise integration,
interoperability and networking: theory and applications.
Petter, S., DeLone, W. and McLean, E.R., 2013. Information systems success: The quest for
the independent variables. Journal of Management Information Systems, 29(4), pp.7-62.
Rainer, R.K., Cegielski, C.G., Splettstoesser-Hogeterp, I. and Sanchez-Rodriguez, C.,
2013. Introduction to information systems. John Wiley & Sons.
Stair, R. and Reynolds, G., 2013. Principles of information systems. Cengage Learning.
Weaver, C.A., Ball, M.J., Kim, G.R. and Kiel, J.M., 2016. Healthcare information
management systems. Cham: Springer International Publishing.
Worrell, J.L., Di Gangi, P.M. and Bush, A.A., 2013. Exploring the use of the Delphi method
in accounting information systems research. International Journal of Accounting Information
Systems, 14(3), pp.193-208.
SECURITY ISSUES IN IT SYSTEMS
Mishra, D., Srinivas, J. and Mukhopadhyay, S., 2014. A secure and efficient chaotic map-
based authenticated key agreement scheme for telecare medicine information
systems. Journal of medical systems, 38(10), p.120.
Panetto, H. and Cecil, J., 2013. Information systems for enterprise integration,
interoperability and networking: theory and applications.
Petter, S., DeLone, W. and McLean, E.R., 2013. Information systems success: The quest for
the independent variables. Journal of Management Information Systems, 29(4), pp.7-62.
Rainer, R.K., Cegielski, C.G., Splettstoesser-Hogeterp, I. and Sanchez-Rodriguez, C.,
2013. Introduction to information systems. John Wiley & Sons.
Stair, R. and Reynolds, G., 2013. Principles of information systems. Cengage Learning.
Weaver, C.A., Ball, M.J., Kim, G.R. and Kiel, J.M., 2016. Healthcare information
management systems. Cham: Springer International Publishing.
Worrell, J.L., Di Gangi, P.M. and Bush, A.A., 2013. Exploring the use of the Delphi method
in accounting information systems research. International Journal of Accounting Information
Systems, 14(3), pp.193-208.
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.