Abstract
Security within the context of Information Systems has long been a concern for both academics and practitioners. For this reason an extensive body of research has been built around the need for protecting vital technical systems and the information contained within them. This stream of research, termed Information Systems Security (ISS), has evolved with technology over the last several decades in numerous different ways. This evolution can create a great deal of difficulty for researchers to identify under-represented areas of ISS research as well as ensure all relevant areas of concern are addressed. The purpose of this paper is threefold: First, our goal is to map the progression of ISS research from past to present. Second, conduct a review of ISS literature from the date of the last holistic literature review to present, identifying key security thematic presented in these works, grouping them categorically. Lastly, from this review we explain the thematic these works resolve to and based on these categories we discuss where ISS research currently stands.
Included in
Information Security Commons, Management Information Systems Commons, Technology and Innovation Commons
IS Security Research Development: Implications For Future Researchers
Security within the context of Information Systems has long been a concern for both academics and practitioners. For this reason an extensive body of research has been built around the need for protecting vital technical systems and the information contained within them. This stream of research, termed Information Systems Security (ISS), has evolved with technology over the last several decades in numerous different ways. This evolution can create a great deal of difficulty for researchers to identify under-represented areas of ISS research as well as ensure all relevant areas of concern are addressed. The purpose of this paper is threefold: First, our goal is to map the progression of ISS research from past to present. Second, conduct a review of ISS literature from the date of the last holistic literature review to present, identifying key security thematic presented in these works, grouping them categorically. Lastly, from this review we explain the thematic these works resolve to and based on these categories we discuss where ISS research currently stands.
Comments
Summary Version