Research Article
BibTex RIS Cite

Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry

Year 2015, Volume: 1 Issue: 1, 1 - 13, 22.03.2016

Abstract

This conceptual paper examines the dichotomy of IS decision makers as both being the client to security systems providers and provider of security for the

established platform and offers Cynefin framework for sense-making in guidance for management decision making landscape. Cynefin framework which was developed in knowledge management context provides a suitable tool of sense-making for decision makers in use of security systems governance whom must both be able to select the right mindset, systems and tools, and also facilitate security using these systems in many cases without adequate knowledge about their internals as well as the environmental factors.

References

  • Ackoff, R. (1974). Redesigning the Future. New York: Wiley.
  • Ajans. (2014, February 25). Retrieved from SonDakika: http://www.sondakika.com/haber/haber-basbakan-devletin-kriptolu-telefonlarini-5712478/
  • Akerlof, G. (1970). The Market for Lemons: Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 84(3),488-500.
  • Alpcan, T., & Başar, T. (2006). An intrusion detection game with limited observations. 12th Int. Sym. on Dynamic Games and Applications. Sophia Antipolis.
  • Bloomberg. (2012). The Price of Cybersecurity. Bloomberg.
  • Burnett, M. (2011, 06 20). 10000 Top Passwords. Retrieved from Xato: https://xato.net/passwords/more-top-worst-passwords/#.UymXeVck-Qs
  • Burnett, M., & Kleiman, D. (2005). Perfect Passwords: Selection, Protection, Authentication. Massachussets: Syngress.
  • CEN. (2004, March 01). European Guide to good Practice in Knowledge Management. Retrieved from European Committee for Standardization: ftp://cenftp1.cenorm.be/PUBLIC/CWAs/e-Europe/KM/CWA14924-01-2004-Mar.pdf
  • Chang, F. R. (2013, November 5). Studying the ‘Wicked Problem’ of Cyber Security. Cyber Security News, 1-2.
  • Eoyang, G. H. (2004). Conditions ofr self-organizing in Human Systems. Futurics, 28,10-50.
  • Epstein, R. A. (1984). In Defense of the Contract At Will. University of Chicago Law School Chicago Unbound , 947-984.
  • Goldratt, E. M. (1997). Critical Chain. New York: The North River Press.
  • Greenwald, G. (2013, June 6). The NSA Files. Retrieved from the Guardian: http://www.theguardian.com/world/the-nsa-files
  • Gregor, S. (2006). The Nature of Theory in Information Systems. MIS Quarterly, 30(3), 611-642.
  • Hasan, H., & Kazlauskas, A. (2009). Making Sense of IS with the Cynefin Framework. Hyderabad: Association for Information Systems.
  • Honan, M. (2012, 11 15). Why no password is safe from hackers. Retrieved 04 1, 2014, from Wired Magazine: http://www.wired.com/2012/11/why-no-password-is-safefrom-hackers/
  • Jones, M. G. (2013). Asymmetric information games and cyber security PhD Dissertation. Atlanta: School of Electrical and Computer Engineering Georgia Institute of Technology.
  • Keen, P. G., & Morton, M. S. (1978). Decision Support Systems An Organizational Perspective. New York: Addison-Wesley.
  • Kellert, S. H. (1993). In the Wake of Chaos: Unpredictable Order in Dynamical Systems. Chicago : University of Chicago Press.
  • Kurtz, C., & Snowden, D. J. (2003). The new dynamics of strategy: Sense-making in a complex and complicated world. IBM Systems Journal, 42(3), 462-483.
  • Murphy, T. J. (2011). A comparison of Cyber Attack Methods. Journal of Physical Security, 5(1), 78-82.
  • Rittel, H., & Webber, M. (1975). Dilemmas in a General Theroy of Planning. Policy Sciences(4), 155-169.
  • Snowden, D. F. (2013). Multi-ontology sense making- a new simplicity in decision making. Informatics in Primary Health Care, 13(1), 45-53.
  • Snowden, D. J. (2005). Multi-ontology senes making: a new semplicity in decision making. Management Today, 20, pp. 1-13.
  • Süskind, P. (1985). Perfume: The Story of a Murderer. New York: Alfred A. Knopf. Trevelyan, B., Smallman-Raynor, M., & Cliff, A. D. (2005). The Spatial Dynamics of
  • Poliomyelitis in the United States: From Epidemic Emergence to Vaccine-Induced Retreat, 1910–1971. Annals of the Association of American Geographes, 95(2), 269-293.
  • USNI. (2010). Cyber Threats to National Security. Cyber Threats to National Security, Symposium One: Countering Challenges to the Global Supply Chain (pp. 1-36). Washington: CACI International Inc.
  • You, X., & Shiyong, Z. (2003). A kind of network security behavior model based on game. Proceedings of the Fourth International Conference on Parallel and Distributed Computing (pp. 950-954). Chengdu: IEEE.
Year 2015, Volume: 1 Issue: 1, 1 - 13, 22.03.2016

Abstract

References

  • Ackoff, R. (1974). Redesigning the Future. New York: Wiley.
  • Ajans. (2014, February 25). Retrieved from SonDakika: http://www.sondakika.com/haber/haber-basbakan-devletin-kriptolu-telefonlarini-5712478/
  • Akerlof, G. (1970). The Market for Lemons: Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 84(3),488-500.
  • Alpcan, T., & Başar, T. (2006). An intrusion detection game with limited observations. 12th Int. Sym. on Dynamic Games and Applications. Sophia Antipolis.
  • Bloomberg. (2012). The Price of Cybersecurity. Bloomberg.
  • Burnett, M. (2011, 06 20). 10000 Top Passwords. Retrieved from Xato: https://xato.net/passwords/more-top-worst-passwords/#.UymXeVck-Qs
  • Burnett, M., & Kleiman, D. (2005). Perfect Passwords: Selection, Protection, Authentication. Massachussets: Syngress.
  • CEN. (2004, March 01). European Guide to good Practice in Knowledge Management. Retrieved from European Committee for Standardization: ftp://cenftp1.cenorm.be/PUBLIC/CWAs/e-Europe/KM/CWA14924-01-2004-Mar.pdf
  • Chang, F. R. (2013, November 5). Studying the ‘Wicked Problem’ of Cyber Security. Cyber Security News, 1-2.
  • Eoyang, G. H. (2004). Conditions ofr self-organizing in Human Systems. Futurics, 28,10-50.
  • Epstein, R. A. (1984). In Defense of the Contract At Will. University of Chicago Law School Chicago Unbound , 947-984.
  • Goldratt, E. M. (1997). Critical Chain. New York: The North River Press.
  • Greenwald, G. (2013, June 6). The NSA Files. Retrieved from the Guardian: http://www.theguardian.com/world/the-nsa-files
  • Gregor, S. (2006). The Nature of Theory in Information Systems. MIS Quarterly, 30(3), 611-642.
  • Hasan, H., & Kazlauskas, A. (2009). Making Sense of IS with the Cynefin Framework. Hyderabad: Association for Information Systems.
  • Honan, M. (2012, 11 15). Why no password is safe from hackers. Retrieved 04 1, 2014, from Wired Magazine: http://www.wired.com/2012/11/why-no-password-is-safefrom-hackers/
  • Jones, M. G. (2013). Asymmetric information games and cyber security PhD Dissertation. Atlanta: School of Electrical and Computer Engineering Georgia Institute of Technology.
  • Keen, P. G., & Morton, M. S. (1978). Decision Support Systems An Organizational Perspective. New York: Addison-Wesley.
  • Kellert, S. H. (1993). In the Wake of Chaos: Unpredictable Order in Dynamical Systems. Chicago : University of Chicago Press.
  • Kurtz, C., & Snowden, D. J. (2003). The new dynamics of strategy: Sense-making in a complex and complicated world. IBM Systems Journal, 42(3), 462-483.
  • Murphy, T. J. (2011). A comparison of Cyber Attack Methods. Journal of Physical Security, 5(1), 78-82.
  • Rittel, H., & Webber, M. (1975). Dilemmas in a General Theroy of Planning. Policy Sciences(4), 155-169.
  • Snowden, D. F. (2013). Multi-ontology sense making- a new simplicity in decision making. Informatics in Primary Health Care, 13(1), 45-53.
  • Snowden, D. J. (2005). Multi-ontology senes making: a new semplicity in decision making. Management Today, 20, pp. 1-13.
  • Süskind, P. (1985). Perfume: The Story of a Murderer. New York: Alfred A. Knopf. Trevelyan, B., Smallman-Raynor, M., & Cliff, A. D. (2005). The Spatial Dynamics of
  • Poliomyelitis in the United States: From Epidemic Emergence to Vaccine-Induced Retreat, 1910–1971. Annals of the Association of American Geographes, 95(2), 269-293.
  • USNI. (2010). Cyber Threats to National Security. Cyber Threats to National Security, Symposium One: Countering Challenges to the Global Supply Chain (pp. 1-36). Washington: CACI International Inc.
  • You, X., & Shiyong, Z. (2003). A kind of network security behavior model based on game. Proceedings of the Fourth International Conference on Parallel and Distributed Computing (pp. 950-954). Chengdu: IEEE.
There are 28 citations in total.

Details

Primary Language English
Journal Section ARTICLES
Authors

Mehmet S. Derindere This is me

Önder Göçer This is me

Publication Date March 22, 2016
Published in Issue Year 2015 Volume: 1 Issue: 1

Cite

APA Derindere, M. S., & Göçer, Ö. (2016). Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education, 1(1), 1-13.
AMA Derindere MS, Göçer Ö. Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education. March 2016;1(1):1-13.
Chicago Derindere, Mehmet S., and Önder Göçer. “Cynefin Framework for Decision Makers for Information Systems Security in the Face of Information Asymmetry”. Istanbul Journal of Innovation in Education 1, no. 1 (March 2016): 1-13.
EndNote Derindere MS, Göçer Ö (March 1, 2016) Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education 1 1 1–13.
IEEE M. S. Derindere and Ö. Göçer, “Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry”, Istanbul Journal of Innovation in Education, vol. 1, no. 1, pp. 1–13, 2016.
ISNAD Derindere, Mehmet S. - Göçer, Önder. “Cynefin Framework for Decision Makers for Information Systems Security in the Face of Information Asymmetry”. Istanbul Journal of Innovation in Education 1/1 (March 2016), 1-13.
JAMA Derindere MS, Göçer Ö. Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education. 2016;1:1–13.
MLA Derindere, Mehmet S. and Önder Göçer. “Cynefin Framework for Decision Makers for Information Systems Security in the Face of Information Asymmetry”. Istanbul Journal of Innovation in Education, vol. 1, no. 1, 2016, pp. 1-13.
Vancouver Derindere MS, Göçer Ö. Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education. 2016;1(1):1-13.