This website uses cookies to ensure you have the best experience. Learn more

On The Development Of Comprehensive Information Security Policies For Organizations

3359 words - 14 pages

Annotated Bibliography Assignment 1

Gary L. Williams

Information Assurance Research Literature

RSC 830

January 20, 2015

Dr. Emily Darraj

Annotated Bibliography Assignment 1
The purpose of this assignment is to examine the topic cybersecurity via an annotated bibliographic review of multiple dissertations. This assignment will work toward the identification of a future dissertation topic within this field and also towards the identification of research material in support of the final dissertation. The annotated bibliographic reviews contained within this paper will work to provide information that will support my future research and provide experience in garnering and ...view middle of the document...

The models examined are UTAUT, theory of reasoned action, technology acceptance model (TAM, TAM-2, and C-TAM-TPB), motivational model, theory of planned behavior, decomposed theory of planned behavior, model of PC utilization, innovation diffusion theory, and social cognitive theory.
The author argued while researchers over the last four decades have developed models to help explain this phenomenon none could keep up with the rate of technological advancement. An area identified by the author as having a significant body of research is return on investment (ROI) as it relates to “IT implementation accounting for user acceptance of IT” (p. 33). The unfortunate part is that this reference to ROI was limited to a single sentence that seemed to be paragraph filler, which is unfortunate.
Hypotheses 5 and 7 were rejected with the rest accepted. Participants perceived WAT could improve performance. The degree of ease of use was not a significant factor. The perception of participant use by others was a significant factor. Facilitating conditions have a direct impact on IT use. Age was the only statistically significant moderator.
NOTES: First, seven hypotheses is overkill in my professional opinion. The overall importance of the study is its potential to improve the understanding of WAT in business environments and as a result increased use of analytics and business effectiveness. It could be particularly useful in change management and strategic planning.
Bao, P. (2013). Sharing insight provenance in collaborative visual analytics (Doctoral dissertation). Retrieved from ProQuest dissertation and thesis database. (UMI No. 3563689)
The author claimed there is a lack of understanding as to how groups and individuals interact with visualizations, which the author argued, is necessary to gain an understanding of the domain. The goal of the dissertation was to “investigate the ways in which sharing these insight discovery processes or insight provenance, may enable individuals to better leverage the analytic activities of their peers” (p. 13). The author argued this research bridges two different areas of visualization: collaborative and provenance. The author argued this integration provides the ability to build better visualization systems, which are better able to provide informed insight.
A platform call Omnipedia (Java based) was developed by the author and used by participants to interact with visualized information. In this study, Omnipedia was used to highlight the similarities and differences in the thousands of topics in multiple languages in Wikipedia. The study looks for interaction patterns associated with insight discovery and attempts to identify ways to share these insights with new users.
The first time the methodology was mentioned formally was page 143 where the author noted quantitative and qualitative methods were utilized to “compare analytic outcomes and behaviors” (p. 143). The author noted the analytic outcomes and...

Other Papers Like On The Development Of Comprehensive Information Security Policies For Organizations

The Impact Of Information Technology On The Accountancy Profession In Nigeria

309 words - 2 pages The Impact Of InformatiOn Technology On The Accountancy prOfessiOn In Nigeria THE IMPACT OF INFORMATION TECHNOLOGY ON THE ACCOUNTING PROFESSION IN NIGERIA By: Idongesit Efiong Utah ABSTRACT This research focuses on assessing the impact of information technology on the Nigerian Accounting profession by examining four areas: Impact on the public and private sector, the challenges and reaction to the challenges posed by information

-Explain The Potential Effects Of Five Different Life Factors, On The Development Of An Individual-

1564 words - 7 pages P2: Explain the potential effects of five different life factors, on the development of an individual. These are the five life factors on the development of an individual Genetic Biological Environmental Socioeconomic Lifestyle 1: Genetic – Psoriasis. My mother inherited Psoriasis from her mother. What is Psoriasis? Psoriasis is a common skin problem affecting about 2% of the population. It occurs equally in men and women

Effects Of Climate Change On The Economic Development Of Viet Nam

8925 words - 36 pages distribution system, rigs, pipeline, causes increases in cost of maintaining energy works. c. .Impacts of climate change on tourism sector Vietnam is in favor of a natural coastline, many islands and rich in natural resources; Marine ecosystems are distributed primarily along the inshore territorial sea and include coral reefs marine algae and mangrove forests. The inherent value that aforementioned are suitable for the development of clusters or

Impact Of Mobile Information And Communication Technology On Cybercrime

6752 words - 28 pages cybercriminals will do the same and direct more attacks at this growing channel. The last two years have witnessed the revolution of the information technology world due to massive development and deployment of mobile systems. Unfortunately the development of the sector has not witnessed corresponding increase in the implementation of appropriate security mechanisms to protect these systems. The lack of adequate awareness programs for users to

How Far Were The Policies Pursued By Philip Ii Responsible For The Revolts Against His Rule In The Netherlands

1266 words - 6 pages How far were the policies pursued by Philip II responsible for the Revolts against his rule in the Netherlands (30 marks) The way that Philip treated the Netherlands through his policies to a large extent cause widespread revolts throughout the Netherlands, especially in the revolt of 1572 where two provinces were held successfully. Policies such as increased taxation and refusal to lessen punishments caused the revolts against his rule in the

Effects Of Tv Watching On A Child's Development

949 words - 4 pages Effects of TV Watching on a Child's Development 8/9/2012  Effects of TV Watching on a Child's Development Introduction A child sitting in with a remote in front of a television set could watch anything from cartoons to programs with murders and sexual content that is not suitable for young minds. On the other hand, TV has its potential benefits that come from viewing some shows. The kids can get to learn positive aspects of social behavior

Effects Of Tv Watching On A Child's Development

942 words - 4 pages Effects of TV Watching on a Child's Development Introduction A child sitting on a couch with a remote in front of a television set could watch anything from cartoons to programs with murders and sexual content that is not suitable for young minds. On the other hand, certain TV programs and shows can have potential benefits for kids. For instance, the kids can get to learn positive aspects of social behavior such as sharing and cooperation. TV

Using Material From Item A And Elsewhere Assess The Usefulness Of Modernization Theory As An Explanation For Differences In The Levels Of Development Of Different Societies. (18 Marks)

811 words - 4 pages Using material from item A and elsewhere assess the usefulness of modernization theory as an explanation for differences in the levels of development of different societies. (18 marks) When the Second World War ended, it became clear that countries in Africa, Asia, Latin America and the Caribbean were remaining poor despite exposure to capitalism and the rational scientific ways of thinking that underpinned this economic system. There was

The Development Theory Of Plate Tectonics

383 words - 2 pages The Development Theory of Plate Tectonics * Introduction In this report I will be describing the theory of the Plate tectonics and showing its main points of development. There are matches between the shapes of South America and Africa. The two continents look like pieces of a jigsaw. Alfred Wegner thought that this meant that the continents where moving. They had once been joined together. He looked for evidence which was recorded in their

Does It Pay Firms To Register For Taxes? The Impact Of Formality On Firm Profitability

1914 words - 8 pages impact of formality on form profitability, Journal of Development Economics, S.15-24 Steinke, Ines (1999): Kriterien qualitativer Forschung - Ansätze zur Bewertung qualitativ - empirischer Sozialforschung, Juventa Verlag, S. 131 ff -------------------------------------------- [ 1 ]. vgl. Encuesta Productividad de Empresas, Mc Kenzie, David; sakho, Yaye Seynabou (2010), S. 16. [ 2 ]. vgl. Mc Kenzie, David; sakho, Yaye Seynabou (2010), S. 18. [ 3 ]. vgl. Mc Kenzie, David; sakho, Yaye Seynabou (2010), S. 20.

Report On The Use Of Facebook In The Organisation Including A Code Of Practice For Its Use

1095 words - 5 pages click on this a list of eight categories will drop down, you will be required to fill in all these details. Step 1. Your organisation, A list will drop down and you will pick the appropriate one (Bar) Step 2. Fill in Business place/Name Step 3. Street Step 4. City Step 5. Zip code (0000) for Ireland Step 6. Phone number Step 7. You will read the Facebook term and when you agree click the box. Step 8. Click (Get Started

Related Essays

Information Security For Managers Essay

2401 words - 10 pages security policy documents 7 1.7 Strategies and techniques to implement information security policies 8 2. Developing the Security Program(Word Count = approx. 500) 9 3. Security Management Models and Practices (Word Count = approx. 500) 11 A. ISO/IEC Model 11 B. NIST Security Model 11 C. RFC 2196 11 D. COBIT 11 E. COSO 12 4. List of References: 13 1. Information Security Policy 1.1 Security: Security has been a real issue for this

Principles Of Information Security: Chapter 1 End Of Chapter Questions

790 words - 4 pages to information security. 3. Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit. a. Threat: i. Theft of Media b. Threat Agent: ii. Hacker (Ex: Ima Hacker) c. Vulnerability: iii. Unprotected system port d. Exposure: iv. Using a

Principles Of Information Security 4th Ed Chapter 1 Review Questions

801 words - 4 pages policy. It is also a science because the software is developed by computer scientists and engineers. Faults are a precise interaction of hardware and software that can be fixed given enough time. 15. Who is ultimately responsible for the security of information in the organization? The Chief Information Security Officer (CISO) 16. What is the relationship between the MULTICS project and the early development of computer security? It was

“Mothers At Work And Stay At Home Mothers On Children’s Attitude Towards Family And Learning: Basis For The Development Of Some (Strengthening Oneself Through Mother’s Enduring) Love Program”

3009 words - 13 pages Name : Vigiline B. Apoli Title : “Mothers - at - Work and Stay - at - Home Mothers on Children’s Attitude towards Family and Learning: Basis for the Development of SOME (Strengthening Oneself through Mother’s Enduring) Love Program” Degree : Master of Education Specialization : Guidance and Counseling Key Concepts : Mother - at – Work, Stay - at - Home Mother, Children’s