Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique

Today, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of information systems. For a long time, sec...

Full description

Bibliographic Details
Main Authors: zahra vazife, Mohammad Mahdi, Nadia Vakili
Format: Article
Language:fas
Published: Allameh Tabataba'i University Press 2019-03-01
Series:مطالعات مدیریت کسب و کار هوشمند
Subjects:
Online Access:https://ims.atu.ac.ir/article_9717_2a6dbecc8b5385f5d0ad6fae16cc6ef5.pdf
_version_ 1797386066724913152
author zahra vazife
Mohammad Mahdi
Nadia Vakili
author_facet zahra vazife
Mohammad Mahdi
Nadia Vakili
author_sort zahra vazife
collection DOAJ
description Today, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of information systems. For a long time, security was considered as one of the main components of information technology infrastructure. This study is an applied research in which meta-synthesis approach has been used for analysis. This research has been carried out using a meta-synthesis approach with a thorough and in-depth review of the subject and combines the findings of qualitative and quantitative research. In this regard, 118 articles on information security and information systems management were evaluated and 55 articles were selected. Then, by analyzing content analysis the relevant dimensions and codes were extracted and the importance and priority of each dimension was determined using Shannon entropy. Based on the findings of the research, knowledge about the value of information, the ability to retrieve information, the correct use of resources, and the coexistence of information and software has the highest importance among the 10 dimensions. Finally, following the research steps, a model for determining and deploying an effective information security management system was presented in three layers of identification, implementation structure, and design of the support system of the information security management system.
first_indexed 2024-03-08T22:03:34Z
format Article
id doaj.art-c3d36f7fb9714dd99b8243f5bd5503f2
institution Directory Open Access Journal
issn 2821-0964
2821-0816
language fas
last_indexed 2024-03-08T22:03:34Z
publishDate 2019-03-01
publisher Allameh Tabataba'i University Press
record_format Article
series مطالعات مدیریت کسب و کار هوشمند
spelling doaj.art-c3d36f7fb9714dd99b8243f5bd5503f22023-12-19T10:33:32ZfasAllameh Tabataba'i University Pressمطالعات مدیریت کسب و کار هوشمند2821-09642821-08162019-03-01726719910.22054/ims.2019.97179717Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Techniquezahra vazife0Mohammad Mahdi1Nadia Vakili2Associate Prof, Information Technology Management, Faculty of Management & economics, sistan & baluchestan university, ZahedanPh.D. student, Information Technology Management; Faculty of Management and Economics, Sistan and Baluchestan, ZahedanMSc, Information Technology Management, Faculty of Management and Economics, Sistan and Baloochestan, ZahedanToday, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of information systems. For a long time, security was considered as one of the main components of information technology infrastructure. This study is an applied research in which meta-synthesis approach has been used for analysis. This research has been carried out using a meta-synthesis approach with a thorough and in-depth review of the subject and combines the findings of qualitative and quantitative research. In this regard, 118 articles on information security and information systems management were evaluated and 55 articles were selected. Then, by analyzing content analysis the relevant dimensions and codes were extracted and the importance and priority of each dimension was determined using Shannon entropy. Based on the findings of the research, knowledge about the value of information, the ability to retrieve information, the correct use of resources, and the coexistence of information and software has the highest importance among the 10 dimensions. Finally, following the research steps, a model for determining and deploying an effective information security management system was presented in three layers of identification, implementation structure, and design of the support system of the information security management system.https://ims.atu.ac.ir/article_9717_2a6dbecc8b5385f5d0ad6fae16cc6ef5.pdfinformation securityinformation systemsmeta-synthesis
spellingShingle zahra vazife
Mohammad Mahdi
Nadia Vakili
Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique
مطالعات مدیریت کسب و کار هوشمند
information security
information systems
meta-synthesis
title Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique
title_full Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique
title_fullStr Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique
title_full_unstemmed Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique
title_short Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique
title_sort model for feasibility study and effective deployment of information security management systems based on meta synthesis technique
topic information security
information systems
meta-synthesis
url https://ims.atu.ac.ir/article_9717_2a6dbecc8b5385f5d0ad6fae16cc6ef5.pdf
work_keys_str_mv AT zahravazife modelforfeasibilitystudyandeffectivedeploymentofinformationsecuritymanagementsystemsbasedonmetasynthesistechnique
AT mohammadmahdi modelforfeasibilitystudyandeffectivedeploymentofinformationsecuritymanagementsystemsbasedonmetasynthesistechnique
AT nadiavakili modelforfeasibilitystudyandeffectivedeploymentofinformationsecuritymanagementsystemsbasedonmetasynthesistechnique