Information System Security Management for the Holy Quran: An Approach towards Reliability of the Holy Quran Online Applications.

被引:2
作者
Norman, Azah Anir [1 ]
Yasin, Norizan Mohd [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Informat Syst, Kuala Lumpur, Malaysia
来源
2013 TAIBAH UNIVERSITY INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION TECHNOLOGY FOR THE HOLY QURAN AND ITS SCIENCES | 2013年
关键词
Information system security management; security management of the Holy Quran; The Holy Quran online applications;
D O I
10.1109/NOORIC.2013.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The online Holy Quran is no longer scarce in the virtual world. Software developers have built many Holy Quran applications to satisfy the online users' need. This is a healthy situation as it increases access of Holy Quran concurrently bridging the gap to making Holy Quran as human companion and savior. However, despite the availability of many online applications of the Holy Quran, control over the reliability of content built by the software developer has yet been rationalized. There is still no clear procedure and standard for the software developer or the software firm to refer to, thus become their source and basis of their development. Consequently, it is extremely difficult for users to ensure content validity of the Holy Quran application provided by these software developers. This study embarks to explore the applicability of the common security management standards which is the Systems Security Engineering Capability Maturity Model (SSE-CMM) to achieve reliability state of online application of the Holy Quran. This study also investigates the definition of common criteria and the security elements of the SSE-CMM. These findings will become part of the procedure involved in Holy Quran online application development. Finally, this study conducts the evaluation of the new definition of security elements by using selected Holy Quran application developer as the real case study. Findings of this research should be able to determine the security management model suitable for the online application development of the Holy Quran based on any development context.
引用
收藏
页码:18 / 23
页数:6
相关论文
共 18 条
[1]  
[Anonymous], 1996, HDB SOFTWARE RELIABI
[2]  
Carnegie-Mellon U., 1999, SYST SEC ENG CAP MAT, P326
[3]   Organizational factors to the effectiveness of implementing information security management [J].
Chang, Shuchih Ernest ;
Ho, Chienta Bruce .
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2006, 106 (3-4) :345-361
[4]  
Davis Noopur, 2005, Secure Software Development Life Cycle Processes: A Technology Scouting Report
[5]   LEARNING CURVE APPROACH TO RELIABILITY MONITORING [J].
DUANE, JT .
IEEE TRANSACTIONS ON AEROSPACE, 1964, AS 2 (02) :563-&
[6]  
Executive Brief, 2012, 2011 SOFTW DEV TREND
[7]  
Hauenstein D., 2012, FAST TRACK FUTURE 20
[8]   An integrative study of information systems security effectiveness [J].
Kankanhalli, A ;
Teo, HH ;
Tan, BCY ;
Wei, KK .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2003, 23 (02) :139-154
[9]  
Littlewood B, 1979, J SYST SOFTWARE, V1, P251
[10]  
Littlewood B., 2000, ICSE 00, P175, DOI DOI 10.1145/336512.336551