2017
DOI: 10.4236/jis.2017.83010
|View full text |Cite
|
Sign up to set email alerts
|

An Innovative Soft Design Science Methodology for Improving Development of a Secure Information System in Tanzania Using Multi-Layered Approach

Abstract: This paper presents an innovative Soft Design Science Methodology for improving information systems security using multi-layered security approach. The study applied Soft Design Science Methodology to address the problematic situation on how information systems security can be improved. In addition, Soft Design Science Methodology was compounded with mixed research methodology. This holistic approach helped for research methodology triangulation. The study assessed security requirements and developed a framewo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…The research study adopted soft systems methodology ( Figure 1) to guide the research process. Soft systems methodology (SSM) is an approach to tackling ill-defined complex problematic situation involving human factor [27] [28] [29] such as security incidents affecting IS.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The research study adopted soft systems methodology ( Figure 1) to guide the research process. Soft systems methodology (SSM) is an approach to tackling ill-defined complex problematic situation involving human factor [27] [28] [29] such as security incidents affecting IS.…”
Section: Methodsmentioning
confidence: 99%
“…The designed survey questionnaire was based on SSE-CMM. Due to the nature of the research problem, soft systems methodology[19] [28][29]…”
mentioning
confidence: 99%
“…Security threats and cyber attacks are accelerated by insecure design and security misconfiguration [2] of web-based applications. Security controls are missing or ineffective security controls [3] [4] [5] are defined during the system development lifecycle. Design flaws (vulnerabilities) are introduced [6] by insecure design which cannot be fixed by correct configurations or perfect implementations of the system [7].…”
Section: Security Headers Adoption and Implementation Have Raised Att...mentioning
confidence: 99%
“…This involves configuring and setting correct security header responses in web-based systems infrastructure. It provides another security tier layer [3] by helping to minimize or eliminate intrusions and security vulnerabilities and threats in web-based systems. Whenever a browser sends requests for a page from a web server, the server responds with the content along with HTTP security response headers [10].…”
Section: Security Headers Adoption and Implementation Have Raised Att...mentioning
confidence: 99%
“…Likewise, a logic model from the program evaluation discipline has featured the use of ISO/IEC standards on software quality to evaluate DSR studies in process assessments [29]. Beyond software artefacts, DSR projects have used International Standards for a human-centered design process in order to assess user experience in the context of Human-Computer Interaction [30] and for information security assessments [31]. However, the application of International Standards to demonstrate research relevance has not been discussed in any of the aforementioned DSR studies.…”
Section: Accepted Manuscriptmentioning
confidence: 99%