Studyspark Study Document

End User Security a Justification Research Proposal

Pages:3 (879 words)

Sources:5

Subject:Mathematics

Topic:Security Principles

Document Type:Research Proposal

Document:#24766651


, 2009). End user awareness and understanding have (not surprisingly) been identified as essential in the overall efficacy of network and information system security success, and organizational culture appears to have a significant mediating or even controlling influence on the efficacy of security programs through their transformation of individual mindsets and group behaviors and attentions, and therefore the interpersonal and psychological aspects of end user security are necessary areas of ongoing study and clarification in order for truly practical and effective end user security measures to be created and adopted (Furnell, 2008; D'Arcy et al., 2009). Developing a comprehensive and pragmatically applicable understanding the relationship between the practical/concrete elements of the end user security plan or system and the abstract/personal/cultural elements of security success has proven problematic, and will be a focus of this research.

Relevance and Significance

Issues of end user security remain highly relevant, with a large and growing number of organizations employing information technologies and networks that require significant levels of security both to shield data from malicious access (both external attacks and internal misuse) and to ensure that proper use and protocols are encouraged to prevent accidental corruption. As increasing amounts of data are stored, manipulated, and transmitted within these organizations and information networks and as more and more of this data becomes sensitive in nature, security concerns only grow more relevant and significant for companies, consumers, and governmental organizations alike. There is already a large amount of research that delves into many areas of network and information security, including studies into different elements of end user security, which themselves stand as a testament to the continued importance of this research area and which explicitly call for an expansion of research topics the collection of more reliable and consistent details and evidence. This research will attempt to answer that call, supporting current findings and presenting more refined questions for future investigation.

References

Church, L. & Blackwell, a. (2008). Usable morality: A challenge for the end security user. www.ppig.org

D'Arcy, J., Hovay, a. & Galleta, D. (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20(1): 79-98.

Furnell, S. (2008). End-user security culture: A lesson that will never be learnt? Computer Fraud & Security (4): 6-9.

Goecks, J., Edwards, W. & Mynatt, E. (2009). Challenges in supporting end-user privacy and security management with social navigation. Proceedings of the 5th Symposium on Usable Privacy and Security.

Kulkarni, a. (2010). Mitigating Security Risks for End User Computing Application (EUCA)…


Sample Source(s) Used

References

Church, L. & Blackwell, a. (2008). Usable morality: A challenge for the end security user. www.ppig.org

D'Arcy, J., Hovay, a. & Galleta, D. (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20(1): 79-98.

Furnell, S. (2008). End-user security culture: A lesson that will never be learnt? Computer Fraud & Security (4): 6-9.

Goecks, J., Edwards, W. & Mynatt, E. (2009). Challenges in supporting end-user privacy and security management with social navigation. Proceedings of the 5th Symposium on Usable Privacy and Security.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Security - Agip Kazakhstan North

Pages: 35 (14948 words) Sources: 1+ Subject: Business Document: #25262390

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Studyspark Study Document

Justifications & Action Plan Net

Pages: 20 (5971 words) Sources: 10 Subject: Education - Computers Document: #67475534

For this reason alone net neutrality should be encouraged. In addition to the problem of restrictive nature of access tiering within a democratic society, such a system is problematic because it is inconsistent with America's image as a leader in the field of technology. Argument Opponents to Net Neutrality For the most part, there are two sides to the debate on net neutrality (Yoo, 2005). On the one hand operators such as

Studyspark Study Document

Securities Regulation of Nonprofit Organizations

Pages: 45 (12607 words) Sources: 40 Subject: Business - Management Document: #11212386

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Studyspark Study Document

Security Management the Role of a Security

Pages: 15 (4672 words) Sources: 15 Subject: Business - Management Document: #61937531

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Studyspark Study Document

Vonnie's Distribution Services Network Security Systems

Pages: 6 (1831 words) Sources: 3 Subject: Education - Computers Document: #17161073

Network Security for Vonnie's Distribution Services Objective of this project is to design network solution and security system for the Vonnie's Distribution Services. The company is considering expanding from the first floor to the third floor within the next few years and the management asks the company Chief Information Officer (CIO) to design a stable, scalable and reliable network security and infrastructure. However, justification of the relationships between security and infrastructure

Studyspark Study Document

ERP and Information Security

Pages: 26 (8373 words) Sources: 1+ Subject: Business Document: #74211420

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

Join thousands of other students and

"spark your studies".