Holistic Approach to Computer Security Dissertation or Thesis by Nicky

Holistic Approach to Computer Security
Presents a complete research study to investigate the role of the psychological nurture versus nature dichotomy in software engineering as an answer to why computer crimes are committed .
# 148972 | 16,555 words | 49 sources | APA | 2011 | US

$19.95 Buy and instantly download this paper now


This paper is a complete research project with the objective of evaluating the necessity of not only technology but also internal processes and policies to manage and mitigate IT risk because of the personalities of software engineers. Next, using a qualitative secondary sources research methodology, the author investigates the problems of software security from the perspective of the thoughts, behavior and personality of the individual engineer. The paper concludes that there is some connection between the psychology of nurture and nature and the development and engineering of software and recommends ways by which organizations can more efficiently organize their IT risk analysis and risk management strategies.

Table of Contents:
Table of Contents
Background Information
Purpose of the Study
Research Questions
Limitations and Assumptions
Definition of Key Terms
Literature Review
Practical Software Engineering
People and Security
Major Threats
Malware and Botnets
Social Networks
Outsource Partners
Cell Phones
Who becomes a Hacker
Why do People Hack into Computer Systems
Security Risk Analysis and Management
Risk Analysis
Risk Management
Security Principles
Research Design and Methodology
Design and Methodology
Problem and Purpose Overview
Research Questions
Data Analysis
Organization of Data Analysis
Analysis of Data
Nature versus Nature
Nature Versus nurture in Software Engineering
Linguistic Relativity
Major Software Engineering Failures
Findings, Conclusions and Implications

From the Paper:

"The authors explain that the ISRAM information risk analysis method is important because it takes into consideration the changing environment that is present as it pertains to information technology. The article further asserts that the technological environments of the time risk analysis methods are composed of complex mathematical and statistical tools. In addition such analysis might necessitate expert participation that may have to occur over a long period of time. The authors also explain that an efficient risk analysis process can not only consist of qualitative measures, because the results may biased. Additionally risk analysis methods that do not have these characteristics may not meet the needs of organizations desiring to protect their computer systems."

Sample of Sources Used:

  • "10 Top IT Disasters". (2007) Retrieved June 5, 2009 from http://www.itepistemology.com/2007/11/10-top-it-disasters-by-zdnet-plus-one.html
  • Barrett Devlin (2009) Computer virus strikes US Marshals, FBI affected. Associated Press. Retrieved June 1, 2009 fromhttp://www.boston.com/news/nation/washington/articles/2009/05/21/apnewbreak_virus_attacks_us_marshals_computers/
  • "Botnet". http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci1030284,00.html
  • Charette, R. N.2005. Why Software Fail, IEEE Spectrum, 42
  • "Computer system". United States Department of Commerce. Retrieved June 1, 2009 http://www.its.bldrdoc.gov/fs-1037/dir-008/_1198.htm

Cite this Dissertation or Thesis:

APA Format

Holistic Approach to Computer Security (2011, November 16) Retrieved July 10, 2020, from https://www.academon.com/dissertation-or-thesis/holistic-approach-to-computer-security-148972/

MLA Format

"Holistic Approach to Computer Security" 16 November 2011. Web. 10 July. 2020. <https://www.academon.com/dissertation-or-thesis/holistic-approach-to-computer-security-148972/>