Information Systems Security Practices in Social Software Applications: A Systematic Literature Review

The paper aims to investigate the current Information Systems Security (ISS) practices of the Social Software Application (SSA) users via the Internet. Design/methodology/approach – The paper opted for a systematic literature review (SLR) survey on ISS and its practices in SSAs between 2010 and 2...

Full description

Saved in:
Bibliographic Details
Main Authors: Norman, A.A., Tamrin, S.I., Hamid, S.
Format: Article
Language:English
Published: Emerald Publishing 2016
Subjects:
Online Access:http://eprints.um.edu.my/17096/1/PDF_Proof.PDF
http://eprints.um.edu.my/17096/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaya
Language: English
Description
Summary:The paper aims to investigate the current Information Systems Security (ISS) practices of the Social Software Application (SSA) users via the Internet. Design/methodology/approach – The paper opted for a systematic literature review (SLR) survey on ISS and its practices in SSAs between 2010 and 2015. The studiy includes a set of 39 papers from among 1,990 retrieved papers published in thirty-three high impact journals. The selected papers were filtered using the Publish or Perish (PoP) software by Harzing and Journal Citation Index (JCR) with an inclusion criterion of least 1 citation per article. Findings – The practice of ISS is driven by the need to protect the confidentiality, integrity, and availability of the data from being tampered. It is coherent with the current practice as reported by many researchers in this study. Four important factors lead to the ISS practice in SSA: protection tools offered, ownership, user behavior and security policy. Practical implications – The paper highlights the implication of successful ISS practices is having clear security purpose and security supported environment (user behavior and security protection tools) and governance (security policy and ownership) protection tools offered, ownership, user behavior and security policy towards ISS practice by the users. Originality/value – This paper fulfills an identified need to study how to enable ISS practice.