, 2009). End user awareness and understanding have (not surprisingly) been identified as essential in the overall efficacy of network and information system security success, and organizational culture appears to have a significant mediating or even controlling influence on the efficacy of security programs through their transformation of individual mindsets and group behaviors and attentions, and therefore the interpersonal and psychological aspects of end user security are necessary areas of ongoing study and clarification in order for truly practical and effective end user security measures to be created and adopted (Furnell, 2008; D'Arcy et al., 2009). Developing a comprehensive and pragmatically applicable understanding the relationship between the practical/concrete elements of the end user security plan or system and the abstract/personal/cultural elements of security success has proven problematic, and will be a focus of this research.
Relevance and Significance
Issues of end user security remain highly relevant, with a large and growing number of organizations employing information technologies and networks that require significant levels of security both to shield data from malicious access (both external attacks and internal misuse) and to ensure that proper use and protocols are encouraged to prevent accidental corruption. As increasing amounts of data are stored, manipulated, and transmitted within these organizations and information networks and as more and more of this data becomes sensitive in
There is already a large amount of research that delves into many areas of network and information security, including studies into different elements of end user security, which themselves stand as a testament to the continued importance of this research area and which explicitly call for an expansion of research topics the collection of more reliable and consistent details and evidence. This research will attempt to answer that call, supporting current findings and presenting more refined questions for future investigation.
References
Church, L. & Blackwell, a. (2008). Usable morality: A challenge for the end security user. www.ppig.org
D'Arcy, J., Hovay, a. & Galleta, D. (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20(1): 79-98.
Furnell, S. (2008). End-user security culture: A lesson that will never be learnt? Computer Fraud & Security (4): 6-9.
Goecks, J., Edwards, W. & Mynatt, E. (2009). Challenges in supporting end-user privacy and security management with social navigation. Proceedings of the 5th Symposium on Usable Privacy and Security.
Kulkarni, a. (2010). Mitigating Security Risks for End User Computing Application (EUCA) Data. IEEE Second International Conference on Social Computing: 1171-6.
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
For this reason alone net neutrality should be encouraged. In addition to the problem of restrictive nature of access tiering within a democratic society, such a system is problematic because it is inconsistent with America's image as a leader in the field of technology. Argument Opponents to Net Neutrality For the most part, there are two sides to the debate on net neutrality (Yoo, 2005). On the one hand operators such as
Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of
Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are
Network Security for Vonnie's Distribution Services Objective of this project is to design network solution and security system for the Vonnie's Distribution Services. The company is considering expanding from the first floor to the third floor within the next few years and the management asks the company Chief Information Officer (CIO) to design a stable, scalable and reliable network security and infrastructure. However, justification of the relationships between security and infrastructure
ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now