Information systems security practices in social software applications A systematic literature review

被引:5
|
作者
Tamrin, Suraya Ika [1 ]
Norman, Azah Anir [1 ]
Hamid, Suraya [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Informat Syst, Kuala Lumpur, Malaysia
关键词
Availability; Integrity; Systematic literature review; Confidentiality; Information systems security practice; Social software applications; NETWORKS CHALLENGES; HEALTH-CARE; PRIVACY; ANONYMIZATION; INFERENCE; LOCATION; FACEBOOK; BEHAVIOR; POLICIES; MEDIA;
D O I
10.1108/AJIM-08-2016-0124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - The purpose of this paper to investigate the current information systems security (ISS) practices of the social software application (SSA) users via the internet. Design/methodology/approach - The paper opted for a systematic literature review survey on ISS and its practices in SSAs between 2010 and 2015. The study includes a set of 39 papers from among 1,990 retrieved papers published in 35 high-impact journals. The selected papers were filtered using the Publish or Perish software by Harzing and Journal Citation Report (JCR) with an inclusion criterion of least one citation per article. Findings - The practice of ISS is driven by the need to protect the confidentiality, integrity, and availability of the data from being tampered. It is coherent with the current practice as reported by many researchers in this study. Four important factors lead to the ISS practice in SSA: protection tools offered, ownership, user behaviour, and security policy. Practical implications - The paper highlights the implication of successful ISS practices is having clear security purpose and security supported environment (user behaviour and security protection tools) and governance (security policy and ownership) protection tools offered, ownership, user behaviour, and security policy towards ISS practice by the users. Originality/value - This paper fulfils an identified need to study how to enable ISS practice.
引用
收藏
页码:131 / 157
页数:27
相关论文
共 50 条
  • [1] Systematic Literature Review on Security Risks and its Practices in Secure Software Development
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Khan, Habib Ullah
    Ilyas, Muhammad
    IEEE ACCESS, 2022, 10 : 5456 - 5481
  • [2] Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review
    Shojaei, Parisasadat
    Vlahu-Gjorgievska, Elena
    Chow, Yang-Wai
    COMPUTERS, 2024, 13 (02)
  • [3] A Systematic Literature Review: Information Security Culture
    Mahfuth, Amjad
    Yussof, Salman
    Abu Baker, Asmidar
    Ali, Nor'ashikin
    2017 5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS 2017): SOCIAL TRANSFORMATION THROUGH DATA SCIENCE, 2017,
  • [4] A Systematic Literature Review of Information Security in Chatbots
    Yang, Jing
    Chen, Yen-Lin
    Por, Lip Yee
    Ku, Chin Soon
    APPLIED SCIENCES-BASEL, 2023, 13 (11):
  • [5] INFORMATION SECURITY CULTURE: A SYSTEMATIC LITERATURE REVIEW
    Hassan, Noor Hafizah
    Ismail, Zuraini
    Maarop, Nurazean
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS, 2015, : 456 - 463
  • [6] Software security patch management-A systematic literature review of challenges, approaches, tools and practices
    Dissanayake, Nesara
    Jayatilaka, Asangi
    Zahedi, Mansooreh
    Babar, M. Ali
    INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 144
  • [7] Software supply chain security: a systematic literature review
    Reichert, Beatriz M.
    Obelheiro, Rafael R.
    International Journal of Computers and Applications, 2024, 46 (10) : 853 - 867
  • [8] Social Commerce from the Information Systems Perspective: A Systematic Literature Review
    Shanmugam, Mohana
    Jusoh, Yusmadi Yah
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [9] Information Seeking in Information Management Practices: A systematic literature review
    Zazmi, Muhammad Zaffri Mohd
    Hussin, Norhayati
    Tokiran, Nurul Syfa Mohd
    Rahman, Abd Latiff Abdul
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2023, 8 : 117 - 125
  • [10] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224