Information Security Status in Organisations 2008

  • Anas Tawileh
  • Jeremy Hilton
  • Stephen McIntosh


This paper presents the results of the latest survey on information security management and pracitces in organisations. The study is based on a holistic approach to information security that does not confine itself to technical measures and technology implementations, but encompasses other equally important aspects such as human, social, motiviational and trust. In order to achieve this purpose, a comprehensive intellectual framework of the concepts of information security using Soft Systems Methodology (SSM) was utilised. The survey questions were drived from this conceptual model to ensure their coherence, completeness and relevance to the topic being addressed. The paper concludes with a discussion of the survey results and draws significant insight into the existing status of informaiton assurance in organisations that could be useful for security practitioners, researchers and managers.


Conceptual Model Technical Measure Survey Result Survey Question Information Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BoBr03]
    G. Booch and A. Brown (2003), Collaborative Development Environments. Advances in Computers, 2003. 59: p. 2–29.Google Scholar
  2. [Chec99]
    P. Checkland (1999), Systems thinking, systems practice. Chichester: John Wiley.Google Scholar
  3. [Fowl02]
    F. J. Fowler (2002), Survey Research Methods. Sage Publications Inc.Google Scholar
  4. [MaTo07]
    S. P. MacGregor and T. Torres-Coronas (2007), Higher Creativity for Virtual Teams: Developing Platforms for Co-Creation. Information Science Reference.Google Scholar
  5. [MoMo02]
    J. Moore and L. Moyer (2002), Questionnaire Design Effects on Interview Outcomes. Survey Methodology, p. 3.Google Scholar
  6. [MoWa94]
    A. Mowshowitz and G. Walsham 1994), Virtual organization: a vision of management in the information age. An alternative view. Reply. The Information society, 10(4): p. 267–294.CrossRefGoogle Scholar
  7. [Murr99]
    P. Murray (1999), Fundamental issues in questionnaire design. Accident and Emergency Nursing, 7(3): p. 148–153.CrossRefGoogle Scholar
  8. [O’Mui97]
    C. O’Muircheartaigh (1997), Election 97: a triumph for the pollsters. MRS Res, p. 14–22.Google Scholar
  9. [TaMa07]
    A. Tawileh and S. McIntosh (2007), Understanding Information Assurance: A Soft Systems Approach. Proceedings of the United Kingdom Systems Society 11th International Conference, September 3–5, Oxford University, UK.Google Scholar
  10. [Tayl98]
    E. Taylor-Powell (1998), Questionnaire Design: Asking questions with a purpose.Google Scholar
  11. [WeKB96]
    H. F. Weisberg, J.A. Krosnick and B.D. Bowen (1996), An Introduction to Survey Research, Polling, and Data Analysis. Sage..Google Scholar
  12. [Wils84]
    B. Wilson (1984), Systems: Concepts, Methodologies, and Applications. New York, NY: John Wiley & Sons, Inc.Google Scholar
  13. [WLMJ04]
    D. Willimack et al. (2004), Evolution and Adaptation of Questionnaire Development, Evaluation, and Testing Methods for Establishment Surveys. Methods for testing and evaluating survey questionnaires. New York: John Wiley & Sons.Google Scholar

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden 2009

Authors and Affiliations

  • Anas Tawileh
    • 1
  • Jeremy Hilton
    • 1
  • Stephen McIntosh
    • 1
  1. 1.School of Computer ScienceCardiff UniversityCardiffUK

Personalised recommendations