preview

Information Systems Security : A Proposed Research Topic

Best Essays

Communications Assignment 2
INFORMATION SYSTEMS SECURITY: A PROPOSED RESEARCH TOPIC

Professor:

Submitted by Student ID
Mohit - 9

Table of contents:

1. Introduction…………………….…………………………………………………………………..3
2. Research Question and Purpose …………..…………………….…………..…………………….....4
3. Methodology………………………..………………………………………………………......5
4. Planning and organization…………………………………………………………………7
5. Conclusion……………………………………………………………………………..…………8
6. References...………………………………………………………………………………………9

Introduction
Information is one of an organization’s most valuable assets. Defense of information assets is necessary to establish and develop trust between the institution and its clients, provide …show more content…

Specially, the Small and Medium Enterprises (SME’s) lack the security policies and governance, hence are exposed to the cyber attacks. They do not have well defined information security system in place and do not have a mitigation policy do defend their information systems during a cyber attack. The purpose of this research proposal is to identify the effectiveness of an organization’s Information Systems Security and various risks involved with it. Also, the various security policies and governance is part of this research proposal.
RQ1- How does the IS security system used in an organization helps to protect the critical information?
RQ2- Is the IS security system strong enough to secure employees and customers’ information?
RQ3- What are various risks associated with an organization IS security systems?
RQ4- What are the standard IS policies which an organization should adopt?
RQ5- What are the various generational differences in information security?
RQ6- What are the various mitigation policies adopted by organizations during a cyber attack?
The theoretical framework chosen for this research is the system development life cycle (SDLC). The SDLC originated in the 1960s and held that in order for IS manufacturers to build effective systems; they must follow certain steps (Lai & Tsen, 2013). These steps are

Get Access