Verified Document

End User Security A Justification Research Proposal

, 2009). End user awareness and understanding have (not surprisingly) been identified as essential in the overall efficacy of network and information system security success, and organizational culture appears to have a significant mediating or even controlling influence on the efficacy of security programs through their transformation of individual mindsets and group behaviors and attentions, and therefore the interpersonal and psychological aspects of end user security are necessary areas of ongoing study and clarification in order for truly practical and effective end user security measures to be created and adopted (Furnell, 2008; D'Arcy et al., 2009). Developing a comprehensive and pragmatically applicable understanding the relationship between the practical/concrete elements of the end user security plan or system and the abstract/personal/cultural elements of security success has proven problematic, and will be a focus of this research. Relevance and Significance

Issues of end user security remain highly relevant, with a large and growing number of organizations employing information technologies and networks that require significant levels of security both to shield data from malicious access (both external attacks and internal misuse) and to ensure that proper use and protocols are encouraged to prevent accidental corruption. As increasing amounts of data are stored, manipulated, and transmitted within these organizations and information networks and as more and more of this data becomes sensitive in

There is already a large amount of research that delves into many areas of network and information security, including studies into different elements of end user security, which themselves stand as a testament to the continued importance of this research area and which explicitly call for an expansion of research topics the collection of more reliable and consistent details and evidence. This research will attempt to answer that call, supporting current findings and presenting more refined questions for future investigation.
References

Church, L. & Blackwell, a. (2008). Usable morality: A challenge for the end security user. www.ppig.org

D'Arcy, J., Hovay, a. & Galleta, D. (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20(1): 79-98.

Furnell, S. (2008). End-user security culture: A lesson that will never be learnt? Computer Fraud & Security (4): 6-9.

Goecks, J., Edwards, W. & Mynatt, E. (2009). Challenges in supporting end-user privacy and security management with social navigation. Proceedings of the 5th Symposium on Usable Privacy and Security.

Kulkarni, a. (2010). Mitigating Security Risks for End User Computing Application (EUCA) Data. IEEE Second International Conference on Social Computing: 1171-6.

Sources used in this document:
References

Church, L. & Blackwell, a. (2008). Usable morality: A challenge for the end security user. www.ppig.org

D'Arcy, J., Hovay, a. & Galleta, D. (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20(1): 79-98.

Furnell, S. (2008). End-user security culture: A lesson that will never be learnt? Computer Fraud & Security (4): 6-9.

Goecks, J., Edwards, W. & Mynatt, E. (2009). Challenges in supporting end-user privacy and security management with social navigation. Proceedings of the 5th Symposium on Usable Privacy and Security.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Justifications & Action Plan Net
Words: 5971 Length: 20 Document Type: Research Paper

For this reason alone net neutrality should be encouraged. In addition to the problem of restrictive nature of access tiering within a democratic society, such a system is problematic because it is inconsistent with America's image as a leader in the field of technology. Argument Opponents to Net Neutrality For the most part, there are two sides to the debate on net neutrality (Yoo, 2005). On the one hand operators such as

Securities Regulation of Nonprofit Organizations
Words: 12607 Length: 45 Document Type: Dissertation or Thesis complete

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Security Management the Role of a Security
Words: 4672 Length: 15 Document Type: Essay

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Vonnie's Distribution Services Network Security Systems
Words: 1831 Length: 6 Document Type: Essay

Network Security for Vonnie's Distribution Services Objective of this project is to design network solution and security system for the Vonnie's Distribution Services. The company is considering expanding from the first floor to the third floor within the next few years and the management asks the company Chief Information Officer (CIO) to design a stable, scalable and reliable network security and infrastructure. However, justification of the relationships between security and infrastructure

ERP and Information Security
Words: 8373 Length: 26 Document Type: Term Paper

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now