Big Data Analytics Adoption Factors in Improving Information Systems Security

Big Data Analytics Adoption Factors in Improving Information Systems Security

Marouane Balmakhtar, Scott E. Mensch
DOI: 10.4018/IJSITA.2019070101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This research measured determinants that influence the willingness of IT/IA professionals to recommend Big Data analytics to improve information systems security in an organization. A review of the literature as well as the works of prior researchers provided the basis for formulation of research questions. Results of this study found that security effectiveness, organizational need, and reliability play a role in the decision to recommend big data analytics to improve information security. This research has implications for both consumers and providers of big data analytics services through the identification of factors that influence IT/IA professionals. These factors aim to improve information systems security, and therefore, which service offerings are likely to meet the needs of these professionals and their organizations.
Article Preview
Top

Introduction

Organizations rely on information systems to excel in business and in their relevant industries. Hence, proposing strategies and investigating new information systems are not only beneficial for creating healthy business organizations, but also for their long-term existence as solid organizations in the face of evolving security threats. According to Yen et al. (2013), using Big Data analytics helps detect these attacks by aggregating large and diverse datasets from various data sources and by conducting long-term historical correlations to incorporate a posteriori information of an attack in the network’s history. Big Data analytics, which is an alternative to other security tools and mechanisms that can be provided on and/off of an organizations’ premises, helps information technology/information assurance (IT/IA) professionals tackle many modern threats facing organizations such as ransomware and advanced persistent threats. IT/IA professionals must keep exploring novel means to alleviate and contain sophisticated attackers in the Big Data era which is transforming the landscape of security mechanisms in the perpetual arms race of attack and defense.

Since the 1990s, it has been quite remarkable how fast Big Data analytics has grown (Chen, Chiang & Storey, 2012; Oghuma, 2013; Ramamurthy et al., 2008). Organizations have tried to create a competitive edge through leveraging their source of data in decision making for strategic intelligence purposes (Barney, 1991; Grant, 1996; Halawi, Aronson, & McCarthy, 2005; Bell, 2013). Big Data analytics is used to process multiple data sources of various data sets for the intention of improving problem identification and persuading critical management decision needs (Giura & Wang, 2012). Simply put, as Brynjolfsson, Hitt, and Kim (2011) indicated, organizations that stress decision making based on Big Data analytics have greater overall organizational performance and productivity.

The recent paradigm shift of security attacks against the technology infrastructure requires a serious look at the best possible means of leveraging Big Data analytics for the purpose of enabling security. Security of information has become more of a Big Data analytics problem where huge amounts of data are used to correlate, analyze, and mine information to identify useful patterns for creating knowledge and protecting existing technologies (Gartner, 2012). The big data analytics leverages tools and mathematical models using large amounts of data to improve an organization’s technological infrastructure (Raja & Rabbani, 2014).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing