University of The Cumberlands Information Systems Security Governance Research

User Generated

grwnq5

Writing

University of the Cumberlands

Description

RESEARCH PAPER TOPIC: Information Systems Security Governance Research: a behavioral perspective.


Final Research Paper: The course research paper is a formatted APA paper. It is 12-14 pages, double-spaced . Paper length requirement is 12-14 pages of content, or approximately 3500 words. The title page and reference page(s) s are not part of this total There should be at least 7 credible sources to support your work.

The Final papers will contain a title page, abstract, introduction/topic paragraph, summary/conclusion, and reference page. A sample of this format is provided in the Additional Course Resources folder provided in the attached APA Template paper.

Unformatted Attachment Preview

DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) This Is Your Title: It Should Be Less Than Twelve Words Your Name Course Name College Name 1 DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50 CHARACTERS OR LESS) Abstract The abstract is on its own page. The first paragraph of the abstract should not be indented. It is typically 150 to 250 words and summarizes the main points of the paper. It should include your thesis and summarize your main points and results. Do not include quotations here. Define any abbreviations and acronyms you use in the paper here. You might want to write it after you’ve written the rest of your paper, so that it’s easy to summarize. In academic publishing, writing a good abstract is important, because it is the first, and sometimes only, bit of information your readers get to help them decide whether they should read or buy your article. After this paragraph, there is a page break that forces the beginning of your paper onto its own page: You will want to keep it there. 2 DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50 CHARACTERS OR LESS) 3 This Is Your Title: It Should Be Less Than Twelve Words This is your introduction and thesis paragraph. The introduction should be about five or six sentences and provide some background or context for your topic. Do not use I or you in academic writing. When appropriate, include recent events relating to the topic. For example, if you are writing about cyber warfare, you might mention Russia using cyber-attacks to influence the last US presidential election. Your thesis should be one sentence and outline the main points of the paper. Literature Review or Background Summarize and quote the important research on this topic that has gone before you. Define subject-specific vocabulary or related theory. Usually, you want to look at books for background. You might want to use your textbook or an encyclopedia to find the names of researchers or theories that are important to the topic, then, search for those names on the library website. Use keywords when research of your topic in databases (example: cyber warfare or cyber attack) to find related articles and books. Need help? Ask A Librarian. Anytime you summarize what someone else has said, include the author’s last name and year either in the text or in parentheses at the end. If you quote someone else, include the author’s last name, year, and page number either in the text or in parentheses at the end. If an article has three to five authors, write their last names out the first time, then cite only the first author’s last name followed by “et al.” If an article has six or more authors, include only the first author’s last name followed by “et al.” If the source does not have an author, such as a website, put the name of the article or webpage in parentheses at the end. DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50 CHARACTERS OR LESS) 4 The whole point of in-text citations is so your reader can find the correct source in your References, so make sure authors or titles match both in-text and in References. Find out more about in-text citation on the Hagan Memorial Library Citation Help page. Business sources are not standard APA citations; See Purdue Owl for more information. Discussion The discussion should be the largest part of your paper and include your argument, research, and experiences (for example, through Service-Learning). Each main point of your paper should start its own paragraph with a strong first sentence. Again, do not use I or you in academic writing. Remember to introduce quotations with who said it and/or why it’s important. Make sure quotes fit seamlessly in your paper. Include short quotations (40 words or less) in-text with quotation marks. Use ellipsis (...) when omitting sections from a quote and use four periods (....) if omitting the end section of a quote. This is a longer quote, which is 40 or more words. Indent the quote a half-inch from the left margin and double-space it with no quotation marks. To get the right format, just click on “Quote” in the Styles area on the Word frame above. In parentheses, include the author’s last name, year, and page number. Conclusion The conclusion restates the thesis and summarizes the main arguments or points of the article, so that your reader could just read the conclusion to generally understand the paper. What is important to learn from reading your paper? If you know of areas in this topic that need further DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50 CHARACTERS OR LESS) study, mention them. After this paragraph, there is a page break that forces References onto its own page: You will want to keep it there. 5 DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50 CHARACTERS OR LESS) References American Psychological Association. (year). Article title. Name of Journal, volume, pages. Author(s). (year). Book title. Where published: Publisher. Retrieved from URL of book Author(s) of essay or chapter. (year). In Author (Ed.), Book title (pages of essay or chapter). Where published: Publisher. Retrieved from URL of chapter or essay Freud, S. (year). Article title. Name of Journal, volume (issue), pages. Retrieved from journal URL Jung, C., & Freud, S. (year). Article title. Name of Journal, volume (issue), pages. Retrieved from article URL if poor navigation on site Neu, J, Lakoff, R., Kamin, J., Green, P. Lessig, L., Brody, E., … Prinzker, T. (year). Book title (edition if given). Where published: Publisher. Pavlov, I., Jung, C., & Freud, S. (year of last update). Web page title. Retrieved from URL of Web page Skinner, B. F. (year). Article title. Name of Journal, volume, pages. doi:xx.xxxxxxxxxx 6
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Use this, I have removed the empty page

Running head: INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE 1

Information Systems Security Governance Research: A Behavioral Perspective
Student’s Name
Course Name
College Name

INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE
Abstract
The use of technology and behavioral perspective are the key features in ensuring
security in information governing. Through a behavioral perspective, employees are encouraged
to comply with the set rules and policies when handling organization information and data (Kim
& Solomon, 2016). Most of the employee behavior is either influenced by personality character
or the organization culture. This paper will discuss the relationship between the behavior of an
employee and or an individual with an impact on information system security governance. This
research paper will discuss different theories and concepts that can be used to improve
behavioral information system security governance. Also, the paper will highlight some of the
main behavior theories from different discipline and discuss about emerging issues in
information systems security governance.

2

INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE

3

Information Systems Security Governance Research: A Behavioral Perspective
Introduction
Information Systems Security Governance can be used in the protection of information
and data from unauthorized individuals through the creation of proper internal controls that aim
at increasing accountability and responsibility. The traditional security system has been failing
over the years, as witnessed in Baring bank. This has made researches to invest more current
systems and adaptation of strict policies and practices that ensures more security. Different
companies have been affected by a weak security system that has affected their working
conditions or exposed their employees and customers' detail. Examples of these companies can
include the Uber breach. According to Risk Based Security research, in the first six months of
2019, there were more than three thousand eight hundred thousand data, and information
disclosed breaches that affected more than 4.1 billion records (Ghose, Lazos & Rozenblit, 2019).
Most of these breaches were caused by internal actions that made the system to be vulnerable,
thus, indicating the failure of the information systems security governance program in those
companies.
Behavioral information systems security governance, on the other hand, ensures proper
organization of people to form a structure in an organization. Through this concept, employees
can show conformity with rules, policies, and guidelines set by the organization. This is done by
setting standards on what should happen if an employee fails to follow the procedure, the type of
punishment, and actions that should be taken to ensure that employees follow the policies. From
the above, Behavioral issues of security are paramount in attaining comprehensive information
system security.

INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE

4

With an increase in the number of hacks and advances in technology, companies should
try to invest in the human behavior aspect. This can be achieved through training and educating
employees about different aspects of information security and its governance. Through this,
employees will be aware of how they should conduct themselves in case of an attack. The most
common types of internal attacks can include denial of services, password attack, SQL injection,
phishing attacks, and eavesdropping attacks. Information about a business is one of its most
valuable assets, making information protection a strategic issue. Traditionally, information
security management is driven by a command-based enforcement model, which assumes control
and regulation of human behavior. This paper will discuss human behavior and different theories
that are essential in understanding information system security governance.
Literature Review
Information systems governance has been considered by different researchers in their line
of work. Lee 2004 created a specific distinction between the information systems and
information technology. Through this, he described information system as a mutual
transformation that occurs between an organization and technology use (lee, 2004). Through this,
the human aspect can be found to have a vital impact on information system governance. Also,
the dynamic and contextual nature of information system governance has been portrayed by most
research. And to solve any issue that arises, both human and technical tools must be kept in place
for more efficiency (Chatterjee, Sarker & Valacich, 2015). By use of both technical and human
aspects, the system can be able to maintain information integrity. Since information is a shared
asset, employees can be able to claim their share (Lee, 2004). This also shows the importance of
behavioral change in the information system.

INFORMATION SYSTEMS SECURITY: A BEHAVIORAL PERSPECTIVE

5

In other research, the advantages of human behavior in the governance process have been
considered. The researchers have used deferent ways on how people behave to determine the
impact of the behavioral aspect in the information governance process. This impact can include
st...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags