• Home
  • /
  • Topic
  • /
  • Arts
  • /
  • Designs
  • /
  • Meta-Notation Design Theory Has Underlying Meta-Requirements Based Essay
Verified Document

Meta-Notation Design Theory Has Underlying Meta-Requirements Based Essay

¶ … meta-notation design theory has underlying meta-requirements based on theories and designed as guide to enable the designing of information systems that are organizational specific. (Siponen, 2006). This theory can help organizations design information systems based on the needs of the organization. The theory is based on theories of it is illogical to state what an organization should do in terms of security, establish identity of methods where subjects and objects can be added to notational patterns, shows ISO modeling can be divided into 3 levels of abstraction, SIS and ISD must operate together, give proper respect to humans, and be quick and effective. Most of the damage of the IT security stems from simple mistakes unintended or unauthorized actions of legitimate users and IT engineers who are either untrained in security and/or who misunderstood instructions from management. (The Security Framework for Information Technology). By following the meta-requirements as a guide, an organization...

Many of the elements of an information system are artifacts, or human made. (Walls, 2004). The elements that are made by humans can be changed by humans. There also needs to be a design theory hypothesis that user calibration can be achieved through proper application of expressiveness, visibility, and inquirability. It needs to be able to be tested for deficiencies. Design theories require a strategy for informing of capabilities, benefits, and implementation strategies for effective adoption. The ISDT would be used as a guiding framework.
Two areas of underdeveloped research are in risk analysis as a foundation for information security management and the nature of non-technological system safeguards. (Backerville, 1994). This is saying that the practice of security policies and doing risk analysis for the security of the information systems have very little…

Sources used in this document:
Bibliography

Backerville, R. (1994). Research Directions in Information Systems Security. International Journal of Information Management, 14(5), 385-387.

Siponen, M.B. (2006). A Design Theory for Secure Information Systems Design Methods. Journal of the Association for Information Systems, 7(11), 725-770.

The Security Framework for Information Technology. (n.d.). Retrieved from TNS: http://www.tns.com/it_security_framework.asp

Walls, J.G. (2004). Assessing Information System Design Theory in Perspective: How Useful was our 1992 Initial Rendition? JITTA: Journal of Information Technology Theory and Application, 6(2), 3-29.
Cite this Document:
Copy Bibliography Citation

Related Documents

Analytic Epidemiology Designs: In 2011, the United
Words: 1020 Length: 3 Document Type: Essay

Analytic Epidemiology Designs: In 2011, the United States Food and Drug Administration reported a shortage of vital chemotherapy drugs, which in turn interfered with clinical trials and contributed to probable challenges in evaluating data from those studies. According to the National Institutes of Health, considerable research trials were hindered by shortages of drugs for treatment of infectious diseases and cancer (Allen, 2011). One of the most important aspects of the advancement

Sampling Designs and Evaluability Assessments Identify and
Words: 1441 Length: 5 Document Type: Essay

Sampling Designs and Evaluability Assessments Identify and discuss 2 types sampling designs, their benefits and limitations In essence, non-probability sampling and probability sampling are the only two types of sampling designs. Non-probability sampling: A researcher selects a small proportion of the units to represent the whole. The selection is deliberate without any defined procedure. For example, if the objective of the researcher is to study the economic conditions of a particular population residing in

Mixed Methods Designs
Words: 1283 Length: 4 Document Type: Essay

Generally, research may be quantitative or qualitative. Nonetheless, the usage of the two methods at the same time is common -- the mixed methods approach. Indeed, using both qualitative and quantitative approaches overcomes the limitations inherent in each approach, resulting in a better understanding of the research problem (Creswell & Clark, 2011). This paper identifies the major components of mixed methods research design and the strengths and weaknesses of the

Validity in Quantitative Research Designs Validity Quantitative
Words: 1280 Length: 4 Document Type: Essay

Validity in Quantitative Research Designs Validity Quantitative Research Designs Validity research refers extent researchers confident effect identify research fact causal relationships. If low validity a study, means research design flawed results . Threats to internal validity in quasi-experimental designs Quasi-experimental studies have several issues that lead to lack of internal validity of the study. These occur as a result of the experimental conditions not being highly controlled or randomized. This leads to intervention

Research Designs in Developmental Research
Words: 911 Length: 3 Document Type: Essay

Development Change Research Issue Developmental change is a broad topic that incorporate several sub-topics relating to an individual's growth and development. The broad nature of this topic emerges from the fact that its an approach that is geared towards explaining how infants, children, and adults change over a period of time. The process of explaining individuals' developmental changes over time involves examining a wide range of theoretical areas including biological, cognitive,

Experimental and Nonexperimental Designs Experimental
Words: 1020 Length: 3 Document Type: Essay

88). To make the non-experimental anthropological study of freshman in a dorm room experimental, a study could be constructed of multiple variable factors (such as high school grades, number of roommates, major, gender) to determine what variables were present in students with higher grades. By submitting questionnaire to students in the dorm room and determining which variables, when present, seemed to correlate with higher grades and were potential 'causal' factors

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now