• Home
  • /
  • Topic
  • /
  • Arts
  • /
  • Designs
  • /
  • Meta-Notation Design Theory Has Underlying Meta-Requirements Based Essay
Verified Document

Meta-Notation Design Theory Has Underlying Meta-Requirements Based Essay

¶ … meta-notation design theory has underlying meta-requirements based on theories and designed as guide to enable the designing of information systems that are organizational specific. (Siponen, 2006). This theory can help organizations design information systems based on the needs of the organization. The theory is based on theories of it is illogical to state what an organization should do in terms of security, establish identity of methods where subjects and objects can be added to notational patterns, shows ISO modeling can be divided into 3 levels of abstraction, SIS and ISD must operate together, give proper respect to humans, and be quick and effective. Most of the damage of the IT security stems from simple mistakes unintended or unauthorized actions of legitimate users and IT engineers who are either untrained in security and/or who misunderstood instructions from management. (The Security Framework for Information Technology). By following the meta-requirements as a guide, an organization...

Many of the elements of an information system are artifacts, or human made. (Walls, 2004). The elements that are made by humans can be changed by humans. There also needs to be a design theory hypothesis that user calibration can be achieved through proper application of expressiveness, visibility, and inquirability. It needs to be able to be tested for deficiencies. Design theories require a strategy for informing of capabilities, benefits, and implementation strategies for effective adoption. The ISDT would be used as a guiding framework.
Two areas of underdeveloped research are in risk analysis as a foundation for information security management and the nature of non-technological system safeguards. (Backerville, 1994). This is saying that the practice of security policies and doing risk analysis for the security of the information systems have very little…

Sources used in this document:
Bibliography

Backerville, R. (1994). Research Directions in Information Systems Security. International Journal of Information Management, 14(5), 385-387.

Siponen, M.B. (2006). A Design Theory for Secure Information Systems Design Methods. Journal of the Association for Information Systems, 7(11), 725-770.

The Security Framework for Information Technology. (n.d.). Retrieved from TNS: http://www.tns.com/it_security_framework.asp

Walls, J.G. (2004). Assessing Information System Design Theory in Perspective: How Useful was our 1992 Initial Rendition? JITTA: Journal of Information Technology Theory and Application, 6(2), 3-29.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now