To read this content please select one of the options below:

Embedding security practices in contemporary information systems development approaches

T. Tryfonas (Department of Informatics, Athens University of Economics and Business, Athens, Greece)
E. Kiountouzis (Department of Informatics, Athens University of Economics and Business, Athens, Greece)
A. Poulymenakou (Department of Informatics, Athens University of Economics and Business, Athens, Greece)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 October 2001

3240

Abstract

As information and communication technologies become a critical component of firms’ infrastructures and information establishes itself as a key business resource as well as driver, people start to realise that there is more than the functionality of the new information systems that is significant. Business or organisational transactions over new media require stability, one factor of which is information security. Information systems development practices have changed in line with the evolution of technology offerings as well as the nature of systems developed. Nevertheless, as this paper establishes, most contemporary development practices do not accommodate sufficiently security concerns. Beyond the literature evidence, reports on empirical study results indicating that practitioners deal with security issues by applying conventional risk analysis practices after the system is developed. Addresses the lack of a defined discipline for security concerns integration in systems development by using field study results recording development practices that are currently in use to illustrate their deficiencies, to point to required enhancements of practice and to propose a list of desired features that contemporary development practices should incorporate to address security concerns.

Keywords

Citation

Tryfonas, T., Kiountouzis, E. and Poulymenakou, A. (2001), "Embedding security practices in contemporary information systems development approaches", Information Management & Computer Security, Vol. 9 No. 4, pp. 183-197. https://doi.org/10.1108/09685220110401254

Publisher

:

MCB UP Ltd

Copyright © 2001, MCB UP Limited

Related articles