Researching of Security in Technology Management

Annotated Bibliography

Albini, A., Tokody, D., & Rajnai, Z. (2018). The categorization and information technology security of automated vehicles. Interdisciplinary Description of Complex Systems, 16(3-A), 327-332.

This source is a scholarly study conducted by Albini, Tokody, and Rajnai (2018), who works at Óbuda University in Hungary, specializing in information security. This article is an invaluable study, the findings of which allow for presenting compelling support for the existence, persistence, and manifestations of the problem of security in the field of information technology management. In particular, the researchers focus on the use of technologies in automated vehicles, where complex sets of data are being processed, which makes the system fragile for attacks. The study is a reliable and informative source of information that will be helpful in writing a research paper since it provides evidence for the problem and gives insights into the possible solutions.

Al-Mhiqani, M. N., Ahmad, R., Yassin, W., Hassan, A., Abidin, Z. Z., Ali, N. S., & Abdulkareem, K. H. (2018). Cyber-security incidents: A review cases in cyber-physical systems. International Journal of Advanced Computer Science and Applications, 9(1), 499-508.

The authors of this scholarly article are researchers specializing in computer science, communication technologies, and cyber-security. The scholars’ article is the result of their work on the investigation of specific cases of incidents in security breaches in the field of information technologies. In particular, the authors conduct in-depth research on cyber-physical systems, which include the interaction between the cyber environment, communication channels, and devices. The scholars claim that the complexity of information systems used by organizations and governments increases the risk of security disruptions. Moreover, a breach in security is particularly threatening to nations due to their reliance on information technologies when managing infrastructures. Thus, this source will serve as a source of evidence on the manifestations of the identified problem.

Asllani, A., Lari, A., & Lari, N. (2018). Strengthening information technology security through the failure modes and effects analysis approach. International Journal of Quality Innovation, 4(1), 1-14.

A study implemented by Asslani, Lari, and Lari (2018) is the work of US business studies scholars specializing in information technologies used in the corporate world. The specialization of the authors makes the article a reliable and credible source of information for future research papers. In particular, the authors focus on the specific methods of eliminating the problem of a security breach in information technology management. They introduce such effective tool as failure mode and effects analysis, which is designed to detect vulnerabilities in security systems and prevent disruptions. The study is an invaluable evidential contribution to the research paper since it provides vivid insights into the manifestation and solution of the problem in the business environment.

Tounsi, W., & Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers & Security, 72, 212–233.

This research article was written by Wiem Tounsi, a cyber security scientist, and Helmi Rais, a senior professional in charge of security services. The credentials of the authors contribute to the credibility and scientific value of the source. The study is based on a survey conducted with organizations to identify the ways in which security breach occurs in contemporary businesses. Moreover, the researchers present compelling arguments on the causes of the intensified persistence of the problem due to the advancement of internet-based and complex information systems. The article is a useful and informative resource to be used in the process of writing the research paper since it provides a solid theoretical and evidential basis on the causes, manifestations, and outcomes of the problem with cyber-security. Most importantly, it demonstrates the methods of effective improvement of information technology security quality. Overall, the use of this article will be a valuable contribution to the validity of the arguments presented in the research paper.

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge, behavior: A comparative study. Journal of Computer Information Systems, 1-16.

The research article by Zwilling et al. (2020) is a comparative study conducted by an international group of authors working in the field of scholarly research on information technology management. All of the authors work for renowned universities in different parts of the world, which enhances the reliability of data present in the publication and amplifies the credibility of the claims presented in the article. The authors’ account of the human factor in the security of technology management provides a background for investigating employee behavior as an essential factor contributing to the occurrence of security breaches. Importantly, the scholars find that this factor should also serve as a means of problem-solving, which is why training and raising awareness are discussed in detail. The article is an informative source for the research paper since it will be used as a building block for cause identification and solution validation.

Security Issues in Information Technology Management

Information technologies have become a driving force of progress in major spheres of human life, having evolved into a strategically important industry that enables the successful functioning of entities and individuals in the contemporary world. When managing the information technologies at an organization, specialists and firms continuously encounter cyber security breaches, which become a significant risk factor hindering organizational performance. In particular, the regulation of some key state infrastructural systems is executed through the use of information technologies. However, the latest statistical findings in the field of cyber-physical systems demonstrate that “cyber-attacks are aimed to destroy nation’s systems used for country development” (Al-Mhiqani et al., 2018, p. 499). Moreover, companies use new complex big-data technologies on a daily basis, and the increase in the frequency of cybercrimes undermines their performance and competitive opportunities (Asslani et al., 2918). For example, the industry of automated vehicles, which particularly depends on information technologies, is fragile due to the threat of cyber-attacks (Albini et al., 2018). Thus, this paper is aimed an analyze the persistent problem of security in information technology management to identify the affected audience, manifestations, and possible solutions.

When contemplating the parties that are being affected by the identified problem, one might identify several groups of the influenced population. Firstly, the threat to the security of information technologies might be an influential risk factor for business organizations due to the potential disruption of operations because of cyber-attacks (Asllani et al., 2018). Secondly, information technology users might be adversely impacted by the lack of information technology security due to the vulnerability of confidential personal data or even physical safety, for example, when driving an automated vehicle (Albini et al., 2018). Thirdly, company employees might be exposed to some negative consequences of improper information technology security since their performance in the workplace is closely connected with information technologies (Zwilling et al., 2020). Lastly, states and governments are the entities that are particularly affected by breaches in cyber-security due to the risks of losing national safety at large (Al-Mhiqani et al., 2018). Thus, the high risk of threats to technology security characterizes the problem as a persistent issue that necessitates solving to protect multiple stakeholders.

The reason why this problem exists might be related to the overall nature of the technology management field. According to researchers, the latest advancements in information technologies and digital tools particularly depend on the Internet, which allows cyber-criminals easier access to data (Asllani et al., 2018; Zwilling et al., 2020). Moreover, the complexity of technologies contributes to the complexity of managing its security, as well as the frequency of implementation of newly designed and improperly tested applications and software might be the root causes (Al-Mhiqani et al., 2018). Importantly, the problem remains under-resolved and persists in the aforementioned areas. The reason for such a recurring nature of the issue might be found in the speed of the development of cyber-attack approaches, which matches the advancement of information technologies at large. Indeed, the “complication in digital systems has led to a change in the cyber-attacks forms, functions, and sophistications from just a few years ago targeting individual end users, businesses and government agencies” (Tounsi & Rais, 2018, p. 213). Thus, it is essential to find an effective solution to prevent the problem from a persistent occurrence.

The importance of resolving this issue is validated by the scope of damage it causes and is likely to cause in the future. In particular, if non-tackled by proper means, cyber-attacks might result in continuous disruption of organizational performance and even lead to disasters, and stealing of data and assets. Moreover, when it comes to the breach in the security of systems in automated vehicles, the lives of people might be in danger (Albini et al., 2018). The problem might disrupt project implementation, employee performance, and even governmental programs launching. The parties responsible for solving the identified problem include the representatives and managers of the entities identified as the affected population. In particular, organizational management, information technology security departments, and end-users of technologies should all be involved in resolving the problem.

To eliminate the threat of cyber-attacks and other manifestations of a security breach, one might recommend developing and implementing special technologies to enhance information technology security from a long-term perspective. According to Albini et al. (2018), “the need for increased IT security has gradually emerged in the development of information technology” (p. 328). Thus, the increase in security might be implemented through employee awareness and training in companies (Zwilling et al., 2020). Indeed, “while protective tools are generally installed on computers and in infrastructure, studies show that they do not completely mitigate cyber security breaches” (Zwilling et al., 2020, p. 2). The reason for such insufficient protection is the role of the human factor in the occurrence of the breach. Therefore, it is essential to train employee behavior and improve knowledge to ensure timely detection and relevant action once a threat is recognized. Moreover, specific departments should be organized to conduct preventative measures to minimize the threats and help entities recover from attempts of cyber-attacks. (Albini et al., 2018). In such a manner, the organizations will be able to prevent, address, and properly react to any breach in cyber-security.

The recommendations might be characterized by both beneficial and negative influences on the involved parties. Indeed, the proposed solution is likely to lead to a more secure working environment and business performance, which is a positive result. However, a significant drawback of the recommendation is additional costs to the entities, which will be triggered by the implementation of new security systems and the launching of employee training. Overall, given the overview and analysis of the problem of security in information technology management, the necessity of its solution is justified by the scope of negative consequences for individuals and entities. Despite the high costs of the proposed solutions, their implementation is likely to help the affected population increase the level of security and ensure long-term safe performance.

Cite this paper

Select style

Reference

StudyCorgi. (2023, January 29). Researching of Security in Technology Management. https://studycorgi.com/researching-of-security-in-technology-management/

Work Cited

"Researching of Security in Technology Management." StudyCorgi, 29 Jan. 2023, studycorgi.com/researching-of-security-in-technology-management/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2023) 'Researching of Security in Technology Management'. 29 January.

1. StudyCorgi. "Researching of Security in Technology Management." January 29, 2023. https://studycorgi.com/researching-of-security-in-technology-management/.


Bibliography


StudyCorgi. "Researching of Security in Technology Management." January 29, 2023. https://studycorgi.com/researching-of-security-in-technology-management/.

References

StudyCorgi. 2023. "Researching of Security in Technology Management." January 29, 2023. https://studycorgi.com/researching-of-security-in-technology-management/.

This paper, “Researching of Security in Technology Management”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.