مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

653
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique

Pages

  71-99

Abstract

 Today, information plays the role of capital of the organization and the protection of corporate information is one of the important pillars of its survival. On the other hand, security issues and barriers are one of the most important issues in the field of Information Systems. For a long time, security was considered as one of the main components of information technology infrastructure. This study is an applied research in which Meta-Synthesis approach has been used for analysis. This research has been carried out using a Meta-Synthesis approach with a thorough and in-depth review of the subject and combines the findings of qualitative and quantitative research. In this regard, 118 articles on Information Security and Information Systems management were evaluated and 55 articles were selected. Then, by analyzing content analysis the relevant dimensions and codes were extracted and the importance and priority of each dimension was determined using Shannon entropy. Based on the findings of the research, knowledge about the value of information, the ability to retrieve information, the correct use of resources, and the coexistence of information and software has the highest importance among the 10 dimensions. Finally, following the research steps, a model for determining and deploying an effective Information Security management system was presented in three layers of identification, implementation structure, and design of the support system of the Information Security management system.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    vazife, zahra, Mahdi, Mohammad, & Vakili, Nadia. (2019). Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique. JOURNAL OF BUSINESS INTELLIGENCE MANAGEMENT STUDIES, 7(26 ), 71-99. SID. https://sid.ir/paper/268141/en

    Vancouver: Copy

    vazife zahra, Mahdi Mohammad, Vakili Nadia. Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique. JOURNAL OF BUSINESS INTELLIGENCE MANAGEMENT STUDIES[Internet]. 2019;7(26 ):71-99. Available from: https://sid.ir/paper/268141/en

    IEEE: Copy

    zahra vazife, Mohammad Mahdi, and Nadia Vakili, “Model for Feasibility Study and Effective Deployment of Information Security Management Systems Based on Meta-Synthesis Technique,” JOURNAL OF BUSINESS INTELLIGENCE MANAGEMENT STUDIES, vol. 7, no. 26 , pp. 71–99, 2019, [Online]. Available: https://sid.ir/paper/268141/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button