Reference Hub1
Big Data Analytics Adoption Factors in Improving Information Systems Security

Big Data Analytics Adoption Factors in Improving Information Systems Security

Marouane Balmakhtar, Scott E. Mensch
Copyright: © 2019 |Volume: 10 |Issue: 3 |Pages: 21
ISSN: 1947-3095|EISSN: 1947-3109|EISBN13: 9781522566823|DOI: 10.4018/IJSITA.2019070101
Cite Article Cite Article

MLA

Balmakhtar, Marouane, and Scott E. Mensch. "Big Data Analytics Adoption Factors in Improving Information Systems Security." IJSITA vol.10, no.3 2019: pp.1-21. http://doi.org/10.4018/IJSITA.2019070101

APA

Balmakhtar, M. & Mensch, S. E. (2019). Big Data Analytics Adoption Factors in Improving Information Systems Security. International Journal of Strategic Information Technology and Applications (IJSITA), 10(3), 1-21. http://doi.org/10.4018/IJSITA.2019070101

Chicago

Balmakhtar, Marouane, and Scott E. Mensch. "Big Data Analytics Adoption Factors in Improving Information Systems Security," International Journal of Strategic Information Technology and Applications (IJSITA) 10, no.3: 1-21. http://doi.org/10.4018/IJSITA.2019070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This research measured determinants that influence the willingness of IT/IA professionals to recommend Big Data analytics to improve information systems security in an organization. A review of the literature as well as the works of prior researchers provided the basis for formulation of research questions. Results of this study found that security effectiveness, organizational need, and reliability play a role in the decision to recommend big data analytics to improve information security. This research has implications for both consumers and providers of big data analytics services through the identification of factors that influence IT/IA professionals. These factors aim to improve information systems security, and therefore, which service offerings are likely to meet the needs of these professionals and their organizations.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.