Empirical vs. non-empirical work in Information Systems Security: A review and analysis of published articles 1995-2005

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Information Systems Security is generally recognized as a small subfield of the larger field of Information Systems. A literature analysis of articles published in the field of Information Systems Security in the years 1995-2005 is presented. Results from the analysis suggested showed that the mix of article content in this subfield favored articles without data. This finding, along with other related findings suggests that the field is in a relatively early state with respect to scientific maturity. Comprehensive literature review articles published in high impact Information Systems journals and a journal dedicated to the subfield may help ISS to progress into a more scientifically mature phase.

Original languageEnglish (US)
Title of host publicationProceedings of the International Symposium on Human Aspects of Information Security and Assurance, HAISA 2007
EditorsSteven M. Furnell, Nathan L. Clarke
PublisherUniversity of Plymouth
Pages141-154
Number of pages14
ISBN (Electronic)9781841021744
StatePublished - Jan 1 2007
EventInternational Symposium on Human Aspects of Information Security and Assurance, HAISA 2007 - Plymouth, United Kingdom
Duration: Jul 10 2007 → …

Publication series

NameProceedings of the International Symposium on Human Aspects of Information Security and Assurance, HAISA 2007

Other

OtherInternational Symposium on Human Aspects of Information Security and Assurance, HAISA 2007
CountryUnited Kingdom
CityPlymouth
Period7/10/07 → …

Keywords

  • Empirical research
  • Information Systems Security
  • Literature review

ASJC Scopus subject areas

  • Safety Research
  • Computer Science Applications
  • Software
  • Social Psychology
  • Applied Psychology
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Empirical vs. non-empirical work in Information Systems Security: A review and analysis of published articles 1995-2005'. Together they form a unique fingerprint.

Cite this