IT Security

IT Security

Matthew Guah (Erasmus School of Economics, The Netherlands)
Copyright: © 2009 |Pages: 12
DOI: 10.4018/978-1-59904-546-7.ch006
OnDemand PDF Download:
$37.50

Abstract

One area that has scarcely received attention in the IT security literature, is the role that individual compliance plays in preventing cyber-attacks. Specifically, how individuals take precautions, how they are motivated to take precautions, and the impact of corporate security policies on individual precaution-taking behaviour have not been extensively researched. Existing literature has underdeveloped conceptualizations of how these control systems work in the realm of information security. This chapter adds to the body of knowledge concerning the socio-organizational perspective for understanding IT security management in the organization that implement VLITP. It examines the VLITP implementation process for achieving IT security management BS 7799 Part 2 certification. The author also gives regards to the role of individual perceptions of the compulsion of controls as a significant part of the IT security process. Focusing more on behavioural aspects of security during the implementation of VLITP, this book considers Information security is to be different from computer security—which is the encompassing of information security in addition to the other aspects of security such as technical aspects, physical security, system security, networking issues, and so forth.. IT security risk considerations cause are capable of causing particular concern on the interdependence of IT systems and inject another element of complexity in the application of the policies governing VLITPs.
Chapter Preview
Top

Introduction

The primary purpose of this chapter is to identify the best approaches for integrating security into the delivery process of VLITP and improve the security of the facility throughout its life cycle. A secondary, though no less important, purpose is to provide a method to assess the impacts of common security approaches on key business outcomes for every sub-project objectives—including project cost, schedule, safety performance, etc.

Important concepts in the security objectives of VLITP deal with the issue of personal information—a valuable asset for doing business over the Internet. The host organization relies on its customers’ personal information not only to enable basic transactions and operations of their business but also to identify new business opportunities. Many risks could be involved in its e-commerce transaction such as poor product quality, unauthorized sharing of personal information, among others. We focus, in this chapter, on privacy risks relating to IT security when implementing VLITP by looking at two privacy beliefs formed from the assessment of privacy risks:

  • Privacy protection is the subjective probability that customers of the host organization believe that their private information is fully protected according to their expected high standard (Pavlou and Chellappa 2001).

  • Privacy risk on the other is where the host organization recognizes a potential loss associated with releasing personal information to the service provided implementing VLITP (Malhotra et al, 2004).

The above contrary privacy beliefs reflect different aspects of VLITP security risk assessment and their separation may allow the examination of the data privacy issues more closely. While both privacy beliefs may seem related, they are often driven or wrought by different factors; thus, play different roles in influencing IT security policies, behaviors and decisions during the implementation of VLITP. Although privacy protection belief is not related to the explicit benefits of the primary exchange, consumers with a high privacy protection belief should perceive more control over privacy risks and are more likely to disclose customers’ personal information. Conversely, host organizations in highly critical industry (i.e. healthcare or defense), quite often perceive a greater loss potential and may be wary about the disclosure of their customers’ personal information during the implementation of VLITP.

BS 7799 stems from the publication of A Code of Practice for Information Security Management in 1993 and then of BS 7799 Part 1 in 1995 in the United Kingdom. It emphasizes more on the development of an IS security management framework and policy, than the technical requirements of IT projects. While previous success of BS 7799 (Part 1) has led to its transformation into an international standard ISO/IEC 17799 (in 2000), BS 7799 Part 2 remains the associated certificate scheme (developed in December 2005) as ISO/IEC 27001. Backhouse et al (2006) describes the institutionalization process of BS 7799 at industry and international levels. This chapter examines the human aspects and organizational issues of BS 7799 during the implementation of VLITP and achieving BS 7799 Part 2 certificate as an evidence of institutionalize IT security management practice in the host organization.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
Leslie Willcocks
Acknowledgment
Chapter 1
Matthew Guah
This chapter classifies the purpose of project management in IT projects as a means of introducing the topics covered in the book and demonstrates... Sample PDF
Introduction to Very Large IT Projects
$37.50
Chapter 2
Matthew Guah
By examining the history of what was earlier considered project management, this chapter not only points out lessons from past practices but also... Sample PDF
The Field of Project Management
$37.50
Chapter 3
Matthew Guah
The basis upon which the objectives and policies for managing a VLITP are formulated is the need to achieve the project objectives on time and under... Sample PDF
Why Implement Very Large IT Projects
$37.50
Chapter 4
Matthew Guah
Different VLITP methodologies are capable of solving various types of problems during a project life cycle. This chapter shows that effect of VLITP... Sample PDF
Methodologies for Implementing VLITPs
$37.50
Chapter 5
IT Governance  (pages 69-83)
Matthew Guah
VLITP managers face unprecedented expectations for their governance. These expectations are driven by mandates and other demands from host... Sample PDF
IT Governance
$37.50
Chapter 6
IT Security  (pages 84-95)
Matthew Guah
One area that has scarcely received attention in the IT security literature, is the role that individual compliance plays in preventing... Sample PDF
IT Security
$37.50
Chapter 7
Matthew Guah
The study of diffusion, adoption, and IT project implementation in popular literature relies on theories which do not address the question of why... Sample PDF
Human Resource Issues in VLITP
$37.50
Chapter 8
Matthew Guah
Medical accidents, such as those that occur as a consequence of errors in medical systems, rarely happen because of a single failure. They are... Sample PDF
Ergonomics of Very Large IT Projects
$37.50
Chapter 9
Matthew Guah
For centuries, organizations have been trying to exchange information between their applications by linking them together. However, such application... Sample PDF
Service-Oriented Architecture: A New Platform for Very Large IT Projects
$37.50
Chapter 10
Matthew Guah
The chapter seeks to advance the practice perspective of VLITP by drawing attention to individual, collective sub-teams and host organizational... Sample PDF
Business Process Management
$37.50
Chapter 11
Matthew Guah
VLITP escalation has been documented to be a widespread phenomenon in the 21st century. Nearly every research in this area has portrayed escalation... Sample PDF
Outsourcing and Escalation Issues in VLITPs
$37.50
Chapter 12
Matthew Guah
The traditional way to achieve the automatic execution of project management processes is to develop or purchase an application that executes the... Sample PDF
VLITP Management Framework
$37.50
Chapter 13
Matthew Guah
The National Programme for Information Technology is the largest civil IT program worldwide at an estimated cost of £6.2 bn, US$ 10 billion, over a... Sample PDF
Case Study I: National Program for IT
$37.50
Chapter 14
Matthew Guah
VLITP can shift the direction of organizations by introducing new systems and emerging technologies that can serve as a trigger for change to the... Sample PDF
Case Study II: RFID—A Technology for Enterprise Systems in the Airlines Industry
$37.50
Chapter 15
Matthew Guah
Prediction markets have proven high forecasting performance in many areas such as politics, sports, and business-related fields, compared to... Sample PDF
Case Study III: VLITP in Public Transport— Implementing OV-Chipcard in The Netherlands
$37.50
About the Author