Information Systems Security Practices in Social Software Applications: A Systematic Literature Review

The paper aims to investigate the current Information Systems Security (ISS) practices of the Social Software Application (SSA) users via the Internet. Design/methodology/approach – The paper opted for a systematic literature review (SLR) survey on ISS and its practices in SSAs between 2010 and 2...

Full description

Saved in:
Bibliographic Details
Main Authors: Norman, A.A., Tamrin, S.I., Hamid, S.
Format: Article
Language:English
Published: Emerald Publishing 2016
Subjects:
Online Access:http://eprints.um.edu.my/17096/1/PDF_Proof.PDF
http://eprints.um.edu.my/17096/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.17096
record_format eprints
spelling my.um.eprints.170962017-03-01T08:55:30Z http://eprints.um.edu.my/17096/ Information Systems Security Practices in Social Software Applications: A Systematic Literature Review Norman, A.A. Tamrin, S.I. Hamid, S. QA75 Electronic computers. Computer science QA76 Computer software The paper aims to investigate the current Information Systems Security (ISS) practices of the Social Software Application (SSA) users via the Internet. Design/methodology/approach – The paper opted for a systematic literature review (SLR) survey on ISS and its practices in SSAs between 2010 and 2015. The studiy includes a set of 39 papers from among 1,990 retrieved papers published in thirty-three high impact journals. The selected papers were filtered using the Publish or Perish (PoP) software by Harzing and Journal Citation Index (JCR) with an inclusion criterion of least 1 citation per article. Findings – The practice of ISS is driven by the need to protect the confidentiality, integrity, and availability of the data from being tampered. It is coherent with the current practice as reported by many researchers in this study. Four important factors lead to the ISS practice in SSA: protection tools offered, ownership, user behavior and security policy. Practical implications – The paper highlights the implication of successful ISS practices is having clear security purpose and security supported environment (user behavior and security protection tools) and governance (security policy and ownership) protection tools offered, ownership, user behavior and security policy towards ISS practice by the users. Originality/value – This paper fulfills an identified need to study how to enable ISS practice. Emerald Publishing 2016 Article PeerReviewed application/pdf en http://eprints.um.edu.my/17096/1/PDF_Proof.PDF Norman, A.A. and Tamrin, S.I. and Hamid, S. (2016) Information Systems Security Practices in Social Software Applications: A Systematic Literature Review. Aslib Journal of Information Management. pp. 1-35. ISSN 2050-3806 (Submitted) DOI: 10.1108/AJIM-08-2016-0124
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
language English
topic QA75 Electronic computers. Computer science
QA76 Computer software
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
Norman, A.A.
Tamrin, S.I.
Hamid, S.
Information Systems Security Practices in Social Software Applications: A Systematic Literature Review
description The paper aims to investigate the current Information Systems Security (ISS) practices of the Social Software Application (SSA) users via the Internet. Design/methodology/approach – The paper opted for a systematic literature review (SLR) survey on ISS and its practices in SSAs between 2010 and 2015. The studiy includes a set of 39 papers from among 1,990 retrieved papers published in thirty-three high impact journals. The selected papers were filtered using the Publish or Perish (PoP) software by Harzing and Journal Citation Index (JCR) with an inclusion criterion of least 1 citation per article. Findings – The practice of ISS is driven by the need to protect the confidentiality, integrity, and availability of the data from being tampered. It is coherent with the current practice as reported by many researchers in this study. Four important factors lead to the ISS practice in SSA: protection tools offered, ownership, user behavior and security policy. Practical implications – The paper highlights the implication of successful ISS practices is having clear security purpose and security supported environment (user behavior and security protection tools) and governance (security policy and ownership) protection tools offered, ownership, user behavior and security policy towards ISS practice by the users. Originality/value – This paper fulfills an identified need to study how to enable ISS practice.
format Article
author Norman, A.A.
Tamrin, S.I.
Hamid, S.
author_facet Norman, A.A.
Tamrin, S.I.
Hamid, S.
author_sort Norman, A.A.
title Information Systems Security Practices in Social Software Applications: A Systematic Literature Review
title_short Information Systems Security Practices in Social Software Applications: A Systematic Literature Review
title_full Information Systems Security Practices in Social Software Applications: A Systematic Literature Review
title_fullStr Information Systems Security Practices in Social Software Applications: A Systematic Literature Review
title_full_unstemmed Information Systems Security Practices in Social Software Applications: A Systematic Literature Review
title_sort information systems security practices in social software applications: a systematic literature review
publisher Emerald Publishing
publishDate 2016
url http://eprints.um.edu.my/17096/1/PDF_Proof.PDF
http://eprints.um.edu.my/17096/
_version_ 1643690388204027904
score 13.18916