The Development of a Model for Information Systems Security Success

The Development of a Model for Information Systems Security Success

Kimberley Dunkerley (Nova Southeastern University, USA) and Gurvirender Tejay (Nova Southeastern University, USA)
DOI: 10.4018/978-1-4666-0170-3.ch017
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Information security has received a great deal of attention from a number of researchers. However, there has been little research aimed at understanding the dimensions critical for the success of organizational information security programs. This chapter considers a large body of information security literature and organizes the research based on their findings. This taxonomy is used to develop a parsimonious model for information security success within organizations. Also, the utility of the proposed model within the contexts of government and healthcare is considered.
Chapter Preview
Top

Is Success Models

The following section introduces three models influential to the development of the IS security success model: Shannon and Weaver (1949), Mason (1978), and DeLone and McLean (1992). DeLone and McLean (1992) is a seminal work in IS success (Elleithy, 2008), and itself builds upon the works of Shannon and Weaver (1949) and Mason (1978). Understanding the evolution of these models and the lessons learned along the way is important for the development of an effective and efficient IS security success model.

Complete Chapter List

Search this Book:
Reset