Information systems security practices in social software applications: A systematic literature review
Abstract
Purpose
The purpose of this paper to investigate the current information systems security (ISS) practices of the social software application (SSA) users via the internet.
Design/methodology/approach
The paper opted for a systematic literature review survey on ISS and its practices in SSAs between 2010 and 2015. The study includes a set of 39 papers from among 1,990 retrieved papers published in 35 high-impact journals. The selected papers were filtered using the Publish or Perish software by Harzing and Journal Citation Report (JCR) with an inclusion criterion of least one citation per article.
Findings
The practice of ISS is driven by the need to protect the confidentiality, integrity, and availability of the data from being tampered. It is coherent with the current practice as reported by many researchers in this study. Four important factors lead to the ISS practice in SSA: protection tools offered, ownership, user behaviour, and security policy.
Practical implications
The paper highlights the implication of successful ISS practices is having clear security purpose and security supported environment (user behaviour and security protection tools) and governance (security policy and ownership) protection tools offered, ownership, user behaviour, and security policy towards ISS practice by the users.
Originality/value
This paper fulfils an identified need to study how to enable ISS practice.
Keywords
Acknowledgements
The authors would like to acknowledge the support provided by UMRG Programme 2013, University of Malaya (RP004E – 13HNE).
Citation
Tamrin, S.I., Norman, A.A. and Hamid, S. (2017), "Information systems security practices in social software applications: A systematic literature review", Aslib Journal of Information Management, Vol. 69 No. 2, pp. 131-157. https://doi.org/10.1108/AJIM-08-2016-0124
Publisher
:Emerald Publishing Limited
Copyright © 2017, Emerald Publishing Limited