IDEAS home Printed from https://ideas.repec.org/a/igg/jea000/v10y2018i1p1-17.html
   My bibliography  Save this article

Applying a Security Management Mechanism to a System Development Lifecycle

Author

Listed:
  • Chia-Ping Yu

    (Department of Information Management, Tamkang University, New Taipei, Taiwan)

  • Chih-Ping Chu

    (Graduate Institute of Management Sciences, Tamkang University, New Taipei, Taiwan)

  • Pin-Hui Lu

    (Department of Information Management, Tamkang University, New Taipei, Taiwan)

Abstract

This article uses qualitative research and grounded theories, to explore information security issues in the development of information systems. Its findings are: first, three security issues are identified: security plans, resources, and a security policy to implement information security mechanisms. Second, there are strong connections between security plans, resources and security policy. Third, managers implement several critical security issues across stages of system development life cycle. This article identifies the opportunities and challenges facing security management issues. Clear security policies or plans can guide software practitioners in an organization to focus on security issues, and keep controlling threats thereafter. In order to improve the quality of security management and to identify possible threats over a longer term, organizations have to monitor and manage their application service providers and security techniques.

Suggested Citation

  • Chia-Ping Yu & Chih-Ping Chu & Pin-Hui Lu, 2018. "Applying a Security Management Mechanism to a System Development Lifecycle," International Journal of E-Adoption (IJEA), IGI Global, vol. 10(1), pages 1-17, January.
  • Handle: RePEc:igg:jea000:v:10:y:2018:i:1:p:1-17
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJEA.2018010101
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jea000:v:10:y:2018:i:1:p:1-17. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.