Friday, June 26, 2020
Research Proposal for an Information Security Management - 1375 Words
Research Proposal for an Information Security Management (Research Proposal Sample) Content: Quantitative Research Proposal for an Information Security Management TopicNameInstitutional Affiliation Quantitative Research Proposal for an Information Security Management TopicIntroductionA robust security information system is one of the key pillars of success in any business organization (James, 2012). The security in the information system is assessed regarding the availability, authenticity of sensitive organizational assets, confidentiality, and integrity. As a result, every management in the business field strives to ensure that its organizations information system is not exposed to threats. Setbacks in the information system profoundly affect organizations chances to realize the formulated goals and objectives (Chu, Chau, So, 2015). The defects in the system affect the flow of information and reliability which adversely affects the decision-making process. It is notable that having an effective information security system is a collaboration of management of various measures in an organization. Such measures include human factors, technological innovations among others. This paper examines the impacts of human factors on information security management in business organizations in an attempt to address the issue. The paper also suggests possible ways to curb the issue from human factors perspectives. Research ProblemTo understand various challenges that hinder the effective management of information security in business organizations, scholars have uncovered numerous issues that facilitate the problem. However, it is observed that the majority of the studies tends to address the issue from a technical point of view while the role of human behaviors and performance is given little attention (Solic, Jovic, Blazevic, 2013). Technological advancements in an organization do not fully guarantee secure information systems. Human factors have a central role in having an effective information security system. Human factors are responsible f or at least 80 percent of all incidences that threaten is safety in organizations (Puhakainen Siponen, 2010). In this regards, IS users security awareness and overall behaviors are critical. Initiating positive human behaviors among IS users has been observed to be a key in managing information security in business organizations. Purpose of the researchThe main purpose of this paper is to determine common factors contributed by employees that threaten efficient management of information security in an organization. A particular focus will give to human behaviors that influence information security to determine whether they can be altered. Upon determining whether identified human behaviors can be changed, the research will explore various alternatives for adjusting such traits. Alternatives identified will be presented in a general way without detailed assessment. Finally, the paper will attempt to assess whether adequate employee training can be used to enhance information securi ty system. The effectiveness of training will be determined in aspects of availability, accessibility, open communication and feedbacks.Significance of the ResearchA central significance of this paper is that it will shed light on the current employees' factors that influence information security management in an organization. While the focus will be human behaviors, a discussion regarding identified traits will reveal how they affect the management of information security in organizations. Moreover, the paper will be of great importance in determining whether employees' behaviors that influence information security can be altered and provides means of adjustment where applicable. Finally, the discoveries of this research will determine the employees' training can effectively enhance the management of information security system in business organizations. In this regard, the paper will reveal the features of an efficient employee that managers should highly consider in their effort to improve information security system.Research QuestionsResearch questions provide the guidelines and focus on quantitative research. A rule of thumb is to have research questions that are clear and produce data that can be replicated to form a valid argument (Cargan, 2007). To accomplish the purpose of this study, the following four research questions are formulated:What are employees factors that negatively influence information security system in organizations?Is it possible to alter employees behaviors that influence information security system?What are alternatives for adjusting negative employees behaviors that influence information security?What is the role of employee training on improving information security management?PopulationDetermining the population to be used is the backbone of scientific research. A rule of thumb is to ensure that the size and type of population chosen align with the purpose of the study (McNabb, 2015). In this regard, the population selected must describe the quantity and cases in the research. Also, the population chosen must be a representative of all possible elements in the study. This ensures that data findings can be generalized and replicated to serve studies beyond subject being studied. In this research, the population will be employees in both public and private sectors where two organizations in each sector will be selected. Sampling SizeThe sampling frame for the research will be all staff of the four organizations selected whose jobs touches on issues related to information systems. The desired sampling size will be 80 respondents. This implies that every organization will be represented by 20 respondents in the final sampling size. The sampling procedure adopted in the study will be probabilistic. Specifically, systematic random sampling method will be used. The systematic sampling method is chosen since it's less tedious compared to simple random sampling (McNabb, 2015). The simplicity of this technique align s with the primary purpose the study.Data CollectionData collection is a crucial stage in quantitative research. To ensure that the data collected serves the purpose this research, the paper will utilize both primary and secondary sources. Primary data will be collected in the selected firms using survey method. The survey will be administered either face to face or be conducted online. Moreover, observation will be used to collect primary data. To complement the main the data gathered, this research will also collect data from secondary sources. Specifically, the paper will only utilize data from peer-reviewed scholarly articles only. Secondary data will be presented in a form of a literature review where theories related to the topic will also be discussed. Instrument Description and ValidationThe instrument to collect primary data in this research will be questionnaires. The questionnaires will be delivered manually where face to face interaction will be involved or be delivered via mail. Providing two options will ensure that the respondents utilize the method that is convenient for them. The purpose of the study will clearly explain while confidentiality and anonymity will also be assured. Other ethical issues such as freedom to participate voluntarily will meet. The questionnaires will be designed to comprise both open-ended and close-ended questions. The two forms of questions play a vital role regarding probing in quantitative research. The questionnaire will be pretested with a representative sample comprising of the expert panel to determine its v...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.