Methodology for practice of information security in software development companies

dc.contributor.advisorGamage C
dc.contributor.authorJayasekara EKU
dc.date.accept2019
dc.date.accessioned2019
dc.date.available2019
dc.date.issued2019
dc.description.abstractWhen modern organizations are considered, information is one of the most critical assets that need to be protected against external and internal threats. Since there is a massive increase in threats related to information technology applications, information security has become a significant factor. Moreover, information security ensures business continuity and reduce the risk of damage to an organization's reputation. Therefore, internal information security management is a critical factor. There are several factors which affect implementation of information security management. This research is focused on finding out a methodology for information security management in software development companies. To achieve objective information security governance, senior management support and organizational culture factors impact on information security management in software development companies are comprehensively studied. Furthermore, existing management models such as plan, do, check and act model, maturity models, etc., were analyzed to understand its applicability to information security management. An online questionnaire was developed based on three major factors identified during the literature review and shared with Associate technical leads, Technical leads, Software architects, Project managers, Delivery managers, Information Technology managers and Heads of IT in the software industry to represent the information security decision makers in an organization. Collected data was analyzed quantitatively using a statistical tool. The research results have shown a strong positive relationship between information security governance and senior management support with information security management. Whereas Organizational culture has a very weak relationship with information security management. According to the research results, PDCA can be recommended to manage information security in Software development organizations.en_US
dc.identifier.accnoTH4402en_US
dc.identifier.citationJayasekara, E.K.U. (2019). Methodology for practice of information security in software development companies [Master’s theses, University of Moratuwa]. Institutional Repository University of Moratuwa. http://dl.lib.uom.lk/handle/123/16363
dc.identifier.degreeMBA in Information Technologyen_US
dc.identifier.departmentDepartment of Computer Science & Engineeringen_US
dc.identifier.facultyEngineeringen_US
dc.identifier.urihttp://dl.lib.uom.lk/handle/123/16363
dc.language.isoenen_US
dc.subjectCOMPUTER SCIENCE – Dissertationsen_US
dc.subjectCOMPUTER SCIENCE AND ENGINEERING – Dissertationsen_US
dc.subjectINFORMATION TECHNOLOGY – Dissertationsen_US
dc.subjectINFORMATION SECURITYen_US
dc.subjectINFORMATION SECURITY MANAGEMENTen_US
dc.subjectORGANIZATIONAL CULTUREen_US
dc.subjectINFORMATION SECURITY GOVERNANCEen_US
dc.subjectPCDA Modelen_US
dc.subjectSOFRTWARE DEVELOPMENT COMPANIESen_US
dc.titleMethodology for practice of information security in software development companiesen_US
dc.typeThesis-Full-texten_US

Files

Original bundle

Now showing 1 - 3 of 3
Loading...
Thumbnail Image
Name:
TH4402-1.pdf
Size:
156.37 KB
Format:
Adobe Portable Document Format
Description:
Pre-text
Loading...
Thumbnail Image
Name:
TH4402-2.pdf
Size:
113.11 KB
Format:
Adobe Portable Document Format
Description:
Post-text
Loading...
Thumbnail Image
Name:
TH4402.pdf
Size:
4.4 MB
Format:
Adobe Portable Document Format
Description:
Full-thesis