Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique

Today, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of information systems. For a long time, sec...

Full description

Bibliographic Details
Main Authors: zahra vazife, Mohammad Mahdi, Nadia Vakili
Format: Article
Language:fas
Published: Allameh Tabataba'i University Press 2019-03-01
Series:مطالعات مدیریت کسب و کار هوشمند
Subjects:
Online Access:https://ims.atu.ac.ir/article_9717_2a6dbecc8b5385f5d0ad6fae16cc6ef5.pdf
Description
Summary:Today, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of information systems. For a long time, security was considered as one of the main components of information technology infrastructure. This study is an applied research in which meta-synthesis approach has been used for analysis. This research has been carried out using a meta-synthesis approach with a thorough and in-depth review of the subject and combines the findings of qualitative and quantitative research. In this regard, 118 articles on information security and information systems management were evaluated and 55 articles were selected. Then, by analyzing content analysis the relevant dimensions and codes were extracted and the importance and priority of each dimension was determined using Shannon entropy. Based on the findings of the research, knowledge about the value of information, the ability to retrieve information, the correct use of resources, and the coexistence of information and software has the highest importance among the 10 dimensions. Finally, following the research steps, a model for determining and deploying an effective information security management system was presented in three layers of identification, implementation structure, and design of the support system of the information security management system.
ISSN:2821-0964
2821-0816