Search icone
Search and publish your papers
Our Guarantee
We guarantee quality.
Find out more!

A critical analysis of two 2006 information technology security surveys

Or download with : a doc exchange

About the author

current graduate student

About the document

Published date
documents in English
case study
6 pages
1 times
Validated by
1 Comment
Rate this document
  1. Introduction
    1. Methodology (ACCSS 2006)
    2. Methodology (EGYM 2006)
  2. Pre theoretical/theoretical (ACCSS 2006)
  3. Empirical (ACCSS 2006)
  4. Empirical (EYGM 2006)
  5. Conclusion
  6. References

My analysis of two surveys ? the 2006 Australian Computer Crime and Security Survey (AusCERT, 2006) and the Ernst and Young 2006 Global Information Security Survey (Ernst and Young Global Limited, 2006) will proceed systematically according to the following simple scheme, one that is motivated by the categories of scientific activities that, T.S. Kuhn posited (Kuhn, 1962), capture what he called normal science

One of my central concerns is to situate several of the unexpected, anomalous, and/or inconsistent points of departure to the extent that such points are made possible by interactions between these levels, both individually (i.e., occurring solely within one survey) and comparatively (i.e., obtaining relationally between surveys).

[...] Trends are useful only when their expression is relevant: what is considered a relevant trend now may not be merely irrelevant within 5 years After an initial discussion involving the methodologies employed, the analysis will move to the theoretical that is, the implicit organization and presentation of the findings. The paper will conclude with commentary on the empirical findings and will attempt to situate and explain consistencies and inconsistencies in lieu of the motives, scope, and available information. Methodology (ACCSS 2006) The ACCSS 2006 survey was funded both privately and publicly (Australian government; AC Nielsen respectively). [...]

[...] This is to say equally that simply because an overwhelming number of technologies saw a decrease in utility, it does not follow that the trend reported in EYGM 2006 regarding increasing investments in information security technology is not sound, not representative, or indicative of some other management-related deficiency, such as a general misuse of funds for technological solutions. This sort of claim is motivated by the following logic: if there is more investment in information technologies, how would it also obtain that there is a general downward trend in the use of that technology? [...]

[...] As the value of these surveys is primarily normative in the sense that the themes and trends inform a potentially beneficial adoption of an effective response this function can be optimized in lieu of industry knowledge about the likely adoption of a technique which might a priori oppose the relevancy of previously sound business advice. There is an internal inconsistency in the CCSS 06 study. In particular the 3rd and the 8th assertions in the executive summary are logically (i.e. [...]

Recent documents in computer science category

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages

Software requirement development - The airline ticketing reservations software systems

 Science & technology   |  Computer science   |  Presentation   |  01/30/2017   |   .doc   |   3 pages