Description
RESEARCH PAPER TOPIC: Information Systems Security Governance Research: a behavioral perspective.
Final Research Paper: The course research paper is a formatted APA paper. It is 12-14 pages, double-spaced . Paper length requirement is 12-14 pages of content, or approximately 3500 words. The title page and reference page(s) s are not part of this total There should be at least 7 credible sources to support your work.
The Final papers will contain a title page, abstract, introduction/topic paragraph, summary/conclusion, and reference page. A sample of this format is provided in the Additional Course Resources folder provided in the attached APA Template paper.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Use this, I have removed the empty page
Running head: INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE 1
Information Systems Security Governance Research: A Behavioral Perspective
Student’s Name
Course Name
College Name
INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE
Abstract
The use of technology and behavioral perspective are the key features in ensuring
security in information governing. Through a behavioral perspective, employees are encouraged
to comply with the set rules and policies when handling organization information and data (Kim
& Solomon, 2016). Most of the employee behavior is either influenced by personality character
or the organization culture. This paper will discuss the relationship between the behavior of an
employee and or an individual with an impact on information system security governance. This
research paper will discuss different theories and concepts that can be used to improve
behavioral information system security governance. Also, the paper will highlight some of the
main behavior theories from different discipline and discuss about emerging issues in
information systems security governance.
2
INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE
3
Information Systems Security Governance Research: A Behavioral Perspective
Introduction
Information Systems Security Governance can be used in the protection of information
and data from unauthorized individuals through the creation of proper internal controls that aim
at increasing accountability and responsibility. The traditional security system has been failing
over the years, as witnessed in Baring bank. This has made researches to invest more current
systems and adaptation of strict policies and practices that ensures more security. Different
companies have been affected by a weak security system that has affected their working
conditions or exposed their employees and customers' detail. Examples of these companies can
include the Uber breach. According to Risk Based Security research, in the first six months of
2019, there were more than three thousand eight hundred thousand data, and information
disclosed breaches that affected more than 4.1 billion records (Ghose, Lazos & Rozenblit, 2019).
Most of these breaches were caused by internal actions that made the system to be vulnerable,
thus, indicating the failure of the information systems security governance program in those
companies.
Behavioral information systems security governance, on the other hand, ensures proper
organization of people to form a structure in an organization. Through this concept, employees
can show conformity with rules, policies, and guidelines set by the organization. This is done by
setting standards on what should happen if an employee fails to follow the procedure, the type of
punishment, and actions that should be taken to ensure that employees follow the policies. From
the above, Behavioral issues of security are paramount in attaining comprehensive information
system security.
INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE
4
With an increase in the number of hacks and advances in technology, companies should
try to invest in the human behavior aspect. This can be achieved through training and educating
employees about different aspects of information security and its governance. Through this,
employees will be aware of how they should conduct themselves in case of an attack. The most
common types of internal attacks can include denial of services, password attack, SQL injection,
phishing attacks, and eavesdropping attacks. Information about a business is one of its most
valuable assets, making information protection a strategic issue. Traditionally, information
security management is driven by a command-based enforcement model, which assumes control
and regulation of human behavior. This paper will discuss human behavior and different theories
that are essential in understanding information system security governance.
Literature Review
Information systems governance has been considered by different researchers in their line
of work. Lee 2004 created a specific distinction between the information systems and
information technology. Through this, he described information system as a mutual
transformation that occurs between an organization and technology use (lee, 2004). Through this,
the human aspect can be found to have a vital impact on information system governance. Also,
the dynamic and contextual nature of information system governance has been portrayed by most
research. And to solve any issue that arises, both human and technical tools must be kept in place
for more efficiency (Chatterjee, Sarker & Valacich, 2015). By use of both technical and human
aspects, the system can be able to maintain information integrity. Since information is a shared
asset, employees can be able to claim their share (Lee, 2004). This also shows the importance of
behavioral change in the information system.
INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE
5
In other research, the advantages of human behavior in the governance process have been
considered. The researchers have used deferent ways on how people behave to determine the
impact of the behavioral aspect in the information governance process. This impact can include
st...