7 research outputs found

    Security Knowledge Management Systems: A Solid Shield Against Computer Abuse

    Get PDF
    Even though organizations have developed and implemented a number of security countermeasures, computer abuse continues to be a problem, and information systems in organizations today remain in jeopardy. Researchers recommend security awareness programs as a means to increase security interest and knowledge, but this has not provided satisfactory results. In this paper, we introduce the concept of security knowledge management systems (SKMS). These systems overcome time and place limitations, consider different levels of security knowledge among users, promote voluntary participation, and provide a positive framework for learning security knowledge. SKMS gives users a way to overcome the limitations of traditional awareness programs through the ability to acquire the most current, diversified security knowledge, to search the knowledge more quickly and accurately, to store it more securely, to share it conveniently, and to maintain it cost effectively. As a result, SKMS allows users to acquire better security knowledge, while giving organizations a cost-effective way of reducing computer abuse

    A Prolegomenon to Information Technology Ethics

    Get PDF
    Information Systems Working Papers Serie

    The Challenge of Computer-Crime Legislation: How Should New York Respond?

    Get PDF

    Crime and Justice in Digital Society: Towards a ‘Digital Criminology’?

    Get PDF
    The opportunities afforded through digital and communications technologies, in particular social media, have inspired a diverse range of interdisciplinary perspectives exploring how such advancements influence the way we live. Rather than positioning technology as existing in a separate space to society more broadly, the ‘digital society’ is a concept that recognises such technologies as an embedded part of the larger social entity and acknowledges the incorporation of digital technologies, media, and networks in our everyday lives (Lupton 2014), including in crime perpetration, victimisation and justice. In this article, we explore potential for an interdisciplinary concept of digital society to expand and inspire innovative crime and justice scholarship within an emerging field of ‘digital criminology’

    Shaping Strategic Information Systems Security Initiatives in Organizations

    Get PDF
    Strategic information systems security initiatives have seldom been successful. The increasing complexity of the business environment in which organizational security must be operationalized presents challenges. There has also been a problem with understanding the patterns of interactions among stakeholders that lead to instituting such an initiative. The overall aim of this research is to enhance understanding of the issues and concerns in shaping strategic information systems security initiative. To be successful, a proper undertaking of the content, context and process of the formulation and institutionalization of a security initiative is essential. It is also important to align the interconnections between these three key components. In conducting the argument, this dissertation analyzes information systems security initiatives in two large government organizations – Information Technology Agency and Department of Transportation. The research methodology adopts an interpretive approach of inquiry. Findings from the case studies show that the strategic security initiative should be harmonious with the cultural continuity of an organization rather than significantly changing the existing opportunity and constraint structures. The development of security cultural resources like security policy may be used as a tool for propagating a secure view of the social world. For secure organizational transformation, one must consider the organizational security structure, knowledgeability of agents in perceiving secure organizational posture, and global security catalysts (such as establishing trust relations and security related institutional reflexivity). The inquiry indicates that strategic security change would be successful in an organization if developed and implemented in a brief yet quantum leap adopting an emergent security strategy in congruence with organizational security values
    corecore