Araştırma Makalesi
BibTex RIS Kaynak Göster

Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry

Yıl 2015, Cilt: 1 Sayı: 1, 1 - 13, 22.03.2016

Öz

This conceptual paper examines the dichotomy of IS decision makers as both being the client to security systems providers and provider of security for the

established platform and offers Cynefin framework for sense-making in guidance for management decision making landscape. Cynefin framework which was developed in knowledge management context provides a suitable tool of sense-making for decision makers in use of security systems governance whom must both be able to select the right mindset, systems and tools, and also facilitate security using these systems in many cases without adequate knowledge about their internals as well as the environmental factors.

Kaynakça

  • Ackoff, R. (1974). Redesigning the Future. New York: Wiley.
  • Ajans. (2014, February 25). Retrieved from SonDakika: http://www.sondakika.com/haber/haber-basbakan-devletin-kriptolu-telefonlarini-5712478/
  • Akerlof, G. (1970). The Market for Lemons: Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 84(3),488-500.
  • Alpcan, T., & Başar, T. (2006). An intrusion detection game with limited observations. 12th Int. Sym. on Dynamic Games and Applications. Sophia Antipolis.
  • Bloomberg. (2012). The Price of Cybersecurity. Bloomberg.
  • Burnett, M. (2011, 06 20). 10000 Top Passwords. Retrieved from Xato: https://xato.net/passwords/more-top-worst-passwords/#.UymXeVck-Qs
  • Burnett, M., & Kleiman, D. (2005). Perfect Passwords: Selection, Protection, Authentication. Massachussets: Syngress.
  • CEN. (2004, March 01). European Guide to good Practice in Knowledge Management. Retrieved from European Committee for Standardization: ftp://cenftp1.cenorm.be/PUBLIC/CWAs/e-Europe/KM/CWA14924-01-2004-Mar.pdf
  • Chang, F. R. (2013, November 5). Studying the ‘Wicked Problem’ of Cyber Security. Cyber Security News, 1-2.
  • Eoyang, G. H. (2004). Conditions ofr self-organizing in Human Systems. Futurics, 28,10-50.
  • Epstein, R. A. (1984). In Defense of the Contract At Will. University of Chicago Law School Chicago Unbound , 947-984.
  • Goldratt, E. M. (1997). Critical Chain. New York: The North River Press.
  • Greenwald, G. (2013, June 6). The NSA Files. Retrieved from the Guardian: http://www.theguardian.com/world/the-nsa-files
  • Gregor, S. (2006). The Nature of Theory in Information Systems. MIS Quarterly, 30(3), 611-642.
  • Hasan, H., & Kazlauskas, A. (2009). Making Sense of IS with the Cynefin Framework. Hyderabad: Association for Information Systems.
  • Honan, M. (2012, 11 15). Why no password is safe from hackers. Retrieved 04 1, 2014, from Wired Magazine: http://www.wired.com/2012/11/why-no-password-is-safefrom-hackers/
  • Jones, M. G. (2013). Asymmetric information games and cyber security PhD Dissertation. Atlanta: School of Electrical and Computer Engineering Georgia Institute of Technology.
  • Keen, P. G., & Morton, M. S. (1978). Decision Support Systems An Organizational Perspective. New York: Addison-Wesley.
  • Kellert, S. H. (1993). In the Wake of Chaos: Unpredictable Order in Dynamical Systems. Chicago : University of Chicago Press.
  • Kurtz, C., & Snowden, D. J. (2003). The new dynamics of strategy: Sense-making in a complex and complicated world. IBM Systems Journal, 42(3), 462-483.
  • Murphy, T. J. (2011). A comparison of Cyber Attack Methods. Journal of Physical Security, 5(1), 78-82.
  • Rittel, H., & Webber, M. (1975). Dilemmas in a General Theroy of Planning. Policy Sciences(4), 155-169.
  • Snowden, D. F. (2013). Multi-ontology sense making- a new simplicity in decision making. Informatics in Primary Health Care, 13(1), 45-53.
  • Snowden, D. J. (2005). Multi-ontology senes making: a new semplicity in decision making. Management Today, 20, pp. 1-13.
  • Süskind, P. (1985). Perfume: The Story of a Murderer. New York: Alfred A. Knopf. Trevelyan, B., Smallman-Raynor, M., & Cliff, A. D. (2005). The Spatial Dynamics of
  • Poliomyelitis in the United States: From Epidemic Emergence to Vaccine-Induced Retreat, 1910–1971. Annals of the Association of American Geographes, 95(2), 269-293.
  • USNI. (2010). Cyber Threats to National Security. Cyber Threats to National Security, Symposium One: Countering Challenges to the Global Supply Chain (pp. 1-36). Washington: CACI International Inc.
  • You, X., & Shiyong, Z. (2003). A kind of network security behavior model based on game. Proceedings of the Fourth International Conference on Parallel and Distributed Computing (pp. 950-954). Chengdu: IEEE.
Yıl 2015, Cilt: 1 Sayı: 1, 1 - 13, 22.03.2016

Öz

Kaynakça

  • Ackoff, R. (1974). Redesigning the Future. New York: Wiley.
  • Ajans. (2014, February 25). Retrieved from SonDakika: http://www.sondakika.com/haber/haber-basbakan-devletin-kriptolu-telefonlarini-5712478/
  • Akerlof, G. (1970). The Market for Lemons: Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 84(3),488-500.
  • Alpcan, T., & Başar, T. (2006). An intrusion detection game with limited observations. 12th Int. Sym. on Dynamic Games and Applications. Sophia Antipolis.
  • Bloomberg. (2012). The Price of Cybersecurity. Bloomberg.
  • Burnett, M. (2011, 06 20). 10000 Top Passwords. Retrieved from Xato: https://xato.net/passwords/more-top-worst-passwords/#.UymXeVck-Qs
  • Burnett, M., & Kleiman, D. (2005). Perfect Passwords: Selection, Protection, Authentication. Massachussets: Syngress.
  • CEN. (2004, March 01). European Guide to good Practice in Knowledge Management. Retrieved from European Committee for Standardization: ftp://cenftp1.cenorm.be/PUBLIC/CWAs/e-Europe/KM/CWA14924-01-2004-Mar.pdf
  • Chang, F. R. (2013, November 5). Studying the ‘Wicked Problem’ of Cyber Security. Cyber Security News, 1-2.
  • Eoyang, G. H. (2004). Conditions ofr self-organizing in Human Systems. Futurics, 28,10-50.
  • Epstein, R. A. (1984). In Defense of the Contract At Will. University of Chicago Law School Chicago Unbound , 947-984.
  • Goldratt, E. M. (1997). Critical Chain. New York: The North River Press.
  • Greenwald, G. (2013, June 6). The NSA Files. Retrieved from the Guardian: http://www.theguardian.com/world/the-nsa-files
  • Gregor, S. (2006). The Nature of Theory in Information Systems. MIS Quarterly, 30(3), 611-642.
  • Hasan, H., & Kazlauskas, A. (2009). Making Sense of IS with the Cynefin Framework. Hyderabad: Association for Information Systems.
  • Honan, M. (2012, 11 15). Why no password is safe from hackers. Retrieved 04 1, 2014, from Wired Magazine: http://www.wired.com/2012/11/why-no-password-is-safefrom-hackers/
  • Jones, M. G. (2013). Asymmetric information games and cyber security PhD Dissertation. Atlanta: School of Electrical and Computer Engineering Georgia Institute of Technology.
  • Keen, P. G., & Morton, M. S. (1978). Decision Support Systems An Organizational Perspective. New York: Addison-Wesley.
  • Kellert, S. H. (1993). In the Wake of Chaos: Unpredictable Order in Dynamical Systems. Chicago : University of Chicago Press.
  • Kurtz, C., & Snowden, D. J. (2003). The new dynamics of strategy: Sense-making in a complex and complicated world. IBM Systems Journal, 42(3), 462-483.
  • Murphy, T. J. (2011). A comparison of Cyber Attack Methods. Journal of Physical Security, 5(1), 78-82.
  • Rittel, H., & Webber, M. (1975). Dilemmas in a General Theroy of Planning. Policy Sciences(4), 155-169.
  • Snowden, D. F. (2013). Multi-ontology sense making- a new simplicity in decision making. Informatics in Primary Health Care, 13(1), 45-53.
  • Snowden, D. J. (2005). Multi-ontology senes making: a new semplicity in decision making. Management Today, 20, pp. 1-13.
  • Süskind, P. (1985). Perfume: The Story of a Murderer. New York: Alfred A. Knopf. Trevelyan, B., Smallman-Raynor, M., & Cliff, A. D. (2005). The Spatial Dynamics of
  • Poliomyelitis in the United States: From Epidemic Emergence to Vaccine-Induced Retreat, 1910–1971. Annals of the Association of American Geographes, 95(2), 269-293.
  • USNI. (2010). Cyber Threats to National Security. Cyber Threats to National Security, Symposium One: Countering Challenges to the Global Supply Chain (pp. 1-36). Washington: CACI International Inc.
  • You, X., & Shiyong, Z. (2003). A kind of network security behavior model based on game. Proceedings of the Fourth International Conference on Parallel and Distributed Computing (pp. 950-954). Chengdu: IEEE.
Toplam 28 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Editorial and Advisory Board
Yazarlar

Mehmet S. Derindere Bu kişi benim

Önder Göçer Bu kişi benim

Yayımlanma Tarihi 22 Mart 2016
Yayımlandığı Sayı Yıl 2015 Cilt: 1 Sayı: 1

Kaynak Göster

APA Derindere, M. S., & Göçer, Ö. (2016). Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education, 1(1), 1-13.
AMA Derindere MS, Göçer Ö. Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education. Mart 2016;1(1):1-13.
Chicago Derindere, Mehmet S., ve Önder Göçer. “Cynefin Framework for Decision Makers for Information Systems Security in the Face of Information Asymmetry”. Istanbul Journal of Innovation in Education 1, sy. 1 (Mart 2016): 1-13.
EndNote Derindere MS, Göçer Ö (01 Mart 2016) Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education 1 1 1–13.
IEEE M. S. Derindere ve Ö. Göçer, “Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry”, Istanbul Journal of Innovation in Education, c. 1, sy. 1, ss. 1–13, 2016.
ISNAD Derindere, Mehmet S. - Göçer, Önder. “Cynefin Framework for Decision Makers for Information Systems Security in the Face of Information Asymmetry”. Istanbul Journal of Innovation in Education 1/1 (Mart 2016), 1-13.
JAMA Derindere MS, Göçer Ö. Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education. 2016;1:1–13.
MLA Derindere, Mehmet S. ve Önder Göçer. “Cynefin Framework for Decision Makers for Information Systems Security in the Face of Information Asymmetry”. Istanbul Journal of Innovation in Education, c. 1, sy. 1, 2016, ss. 1-13.
Vancouver Derindere MS, Göçer Ö. Cynefin Framework for Decision Makers for Information Systems Security in the face of Information Asymmetry. Istanbul Journal of Innovation in Education. 2016;1(1):1-13.