An analysis of the traditional IS security approaches: implications for research and practice

作者: Mikko T Siponen , None

DOI: 10.1057/PALGRAVE.EJIS.3000537

关键词:

摘要: Scholars have developed several modern information systems security (ISS) methods. Yet the traditional ISS methods - checklists, standards, maturity criteria, risk management (RM) and formal (FM) are still among most used This study makes sense of these by comparing their underlying key assumptions. The main finding is that regurgitate features assumptions required to be dealt with developers practitioners.

参考文章(47)
Juhani Iivari, Rudy Hirschheim, Heinz K. Klein, A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches Journal of Management Information Systems. ,vol. 17, pp. 179- 218 ,(2000) , 10.1080/07421222.2000.11045656
Heinz K. Klein, Michael D. Myers, A set of principles for conducting and evaluating interpretive field studies in information systems Management Information Systems Quarterly. ,vol. 23, pp. 67- 93 ,(1999) , 10.2307/249410
Richard Baskerville, Information systems security design methods: implications for information systems development ACM Computing Surveys. ,vol. 25, pp. 375- 414 ,(1993) , 10.1145/162124.162127
S. Furnell, M. Warren, P. Sanders, Baseline security guidelines for health care management Data security for health care, vol. I. pp. 82- 107 ,(1996)
Ralph Spencer Poore, Generally Accepted System Security Principles Release for Public Comment Information Systems Security. ,vol. 8, pp. 27- 77 ,(1999)
Gareth Morgan, Gibson Burrell, Meryl Reis Louis, Sociological Paradigms and Organizational Analysis ,(1979)