, 2009). End user awareness and understanding have (not surprisingly) been identified as essential in the overall efficacy of network and information system security success, and organizational culture appears to have a significant mediating or even controlling influence on the efficacy of security programs through their transformation of individual mindsets and group behaviors and attentions, and therefore the interpersonal and psychological aspects of end user security are necessary areas of ongoing study and clarification in order for truly practical and effective end user security measures to be created and adopted (Furnell, 2008; D'Arcy et al., 2009). Developing a comprehensive and pragmatically applicable understanding the relationship between the practical/concrete elements of the end user security plan or system and the abstract/personal/cultural elements of security success has proven problematic, and will be a focus of this research.
Relevance and Significance
Issues of end user security remain highly relevant, with a large and growing number of organizations employing information technologies and networks that require significant levels of security both to shield data from malicious access (both external attacks and internal misuse) and to ensure that proper use and protocols are encouraged to prevent accidental corruption. As increasing amounts of data are stored, manipulated, and transmitted within these organizations and information networks and as more and more of this data becomes sensitive in
There is already a large amount of research that delves into many areas of network and information security, including studies into different elements of end user security, which themselves stand as a testament to the continued importance of this research area and which explicitly call for an expansion of research topics the collection of more reliable and consistent details and evidence. This research will attempt to answer that call, supporting current findings and presenting more refined questions for future investigation.
References
Church, L. & Blackwell, a. (2008). Usable morality: A challenge for the end security user. www.ppig.org
D'Arcy, J., Hovay, a. & Galleta, D. (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20(1): 79-98.
Furnell, S. (2008). End-user security culture: A lesson that will never be learnt? Computer Fraud & Security (4): 6-9.
Goecks, J., Edwards, W. & Mynatt, E. (2009). Challenges in supporting end-user privacy and security management with social navigation. Proceedings of the 5th Symposium on Usable Privacy and Security.
Kulkarni, a. (2010). Mitigating Security Risks for End User Computing Application (EUCA) Data. IEEE Second International Conference on Social Computing: 1171-6.
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
Network Security for Vonnie's Distribution Services Objective of this project is to design network solution and security system for the Vonnie's Distribution Services. The company is considering expanding from the first floor to the third floor within the next few years and the management asks the company Chief Information Officer (CIO) to design a stable, scalable and reliable network security and infrastructure. However, justification of the relationships between security and infrastructure
ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been
Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end
Internet Way: a Unifying Theory and Methodology for Corporate Systems Development The face of business has changed drastically since the advent of the Internet. Traditional brick and mortar businesses are finding themselves with new marketing avenues. The Internet has led to the invention of a new comer to the business world as well, the e-business. These businesses exist only on the Internet. They do not have a traditional brick and mortar
IT Acquisition. Version 2.0 I have added info to the last three questions, and changed quite a bit Question #4. The area in yellow are new or changed. I did make a few corrections elsewhere too so if this works you might want to look over each completely. What can an organization do to guard against funding proposed projects that intentionally or unintentionally underestimate the costs, do not fully communicate the risks,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now