Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique
Today, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of information systems. For a long time, sec...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | fas |
Published: |
Allameh Tabataba'i University Press
2019-03-01
|
Series: | مطالعات مدیریت کسب و کار هوشمند |
Subjects: | |
Online Access: | https://ims.atu.ac.ir/article_9717_2a6dbecc8b5385f5d0ad6fae16cc6ef5.pdf |
_version_ | 1797386066724913152 |
---|---|
author | zahra vazife Mohammad Mahdi Nadia Vakili |
author_facet | zahra vazife Mohammad Mahdi Nadia Vakili |
author_sort | zahra vazife |
collection | DOAJ |
description | Today, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of information systems. For a long time, security was considered as one of the main components of information technology infrastructure. This study is an applied research in which meta-synthesis approach has been used for analysis. This research has been carried out using a meta-synthesis approach with a thorough and in-depth review of the subject and combines the findings of qualitative and quantitative research. In this regard, 118 articles on information security and information systems management were evaluated and 55 articles were selected. Then, by analyzing content analysis the relevant dimensions and codes were extracted and the importance and priority of each dimension was determined using Shannon entropy. Based on the findings of the research, knowledge about the value of information, the ability to retrieve information, the correct use of resources, and the coexistence of information and software has the highest importance among the 10 dimensions. Finally, following the research steps, a model for determining and deploying an effective information security management system was presented in three layers of identification, implementation structure, and design of the support system of the information security management system. |
first_indexed | 2024-03-08T22:03:34Z |
format | Article |
id | doaj.art-c3d36f7fb9714dd99b8243f5bd5503f2 |
institution | Directory Open Access Journal |
issn | 2821-0964 2821-0816 |
language | fas |
last_indexed | 2024-03-08T22:03:34Z |
publishDate | 2019-03-01 |
publisher | Allameh Tabataba'i University Press |
record_format | Article |
series | مطالعات مدیریت کسب و کار هوشمند |
spelling | doaj.art-c3d36f7fb9714dd99b8243f5bd5503f22023-12-19T10:33:32ZfasAllameh Tabataba'i University Pressمطالعات مدیریت کسب و کار هوشمند2821-09642821-08162019-03-01726719910.22054/ims.2019.97179717Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Techniquezahra vazife0Mohammad Mahdi1Nadia Vakili2Associate Prof, Information Technology Management, Faculty of Management & economics, sistan & baluchestan university, ZahedanPh.D. student, Information Technology Management; Faculty of Management and Economics, Sistan and Baluchestan, ZahedanMSc, Information Technology Management, Faculty of Management and Economics, Sistan and Baloochestan, ZahedanToday, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of information systems. For a long time, security was considered as one of the main components of information technology infrastructure. This study is an applied research in which meta-synthesis approach has been used for analysis. This research has been carried out using a meta-synthesis approach with a thorough and in-depth review of the subject and combines the findings of qualitative and quantitative research. In this regard, 118 articles on information security and information systems management were evaluated and 55 articles were selected. Then, by analyzing content analysis the relevant dimensions and codes were extracted and the importance and priority of each dimension was determined using Shannon entropy. Based on the findings of the research, knowledge about the value of information, the ability to retrieve information, the correct use of resources, and the coexistence of information and software has the highest importance among the 10 dimensions. Finally, following the research steps, a model for determining and deploying an effective information security management system was presented in three layers of identification, implementation structure, and design of the support system of the information security management system.https://ims.atu.ac.ir/article_9717_2a6dbecc8b5385f5d0ad6fae16cc6ef5.pdfinformation securityinformation systemsmeta-synthesis |
spellingShingle | zahra vazife Mohammad Mahdi Nadia Vakili Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique مطالعات مدیریت کسب و کار هوشمند information security information systems meta-synthesis |
title | Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique |
title_full | Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique |
title_fullStr | Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique |
title_full_unstemmed | Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique |
title_short | Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique |
title_sort | model for feasibility study and effective deployment of information security management systems based on meta synthesis technique |
topic | information security information systems meta-synthesis |
url | https://ims.atu.ac.ir/article_9717_2a6dbecc8b5385f5d0ad6fae16cc6ef5.pdf |
work_keys_str_mv | AT zahravazife modelforfeasibilitystudyandeffectivedeploymentofinformationsecuritymanagementsystemsbasedonmetasynthesistechnique AT mohammadmahdi modelforfeasibilitystudyandeffectivedeploymentofinformationsecuritymanagementsystemsbasedonmetasynthesistechnique AT nadiavakili modelforfeasibilitystudyandeffectivedeploymentofinformationsecuritymanagementsystemsbasedonmetasynthesistechnique |