Information Security as a Social Interaction Form Research Paper

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Jan 23rd, 2024

Abstract

Information security is one of the most important notions that characterizes modern society. It is an aspect that defines social interaction. Thus, it is possible to hypothesize that information security is the key function of the information infrastructure of contemporary society. The research design for this study was chosen to be qualitative to ensure that the gathered data will be comprehensive and in-depth. The theoretical analysis of scientific publications on the topic will be compiled with sociological methods. In particular, questionnaires and interviews will be developed to obtain the required feedback. In the course of the research, the hypothesis would be either proved or invalidated, as per the study results.

We will write a custom essay on your topic a custom Research Paper on Information Security as a Social Interaction Form
808 writers online

Introduction

It is worth noting that the issue of information security is one of the most critical in modern society, characterized by high technological development. The 21st century is the epoch of the formation of the information society in which interaction primarily is based on the information and communication (Al-Fedaghi 295). The investigation of such concepts as information and telecommunications attracts more researchers in connection with the problems that represent the underlying consequences of these domains. This area of study involves an appeal to aspects such as the protection of intellectual property, opposition to the promotion of propaganda and incitement of social hatred, and so on. The contemporary social relationships are unfolded in the new information reality; in this regard, it is necessary to determine what kind of information should fill the social environment. More precisely, information security should be perceived as an aspect that defines social interaction.

Hypothesis

Information security implies moral and ethical, organizational, and regulatory relations in society (Alwi and Fan 152). It should be aimed at ensuring the protection of the rights of individuals, organizations, and society as a whole. Moreover, poor security of peoples’ right to access to information or the manipulation of information can cause a negative reaction of the society, which can lead to destabilization of the socio-political situation (Meyer and Zhu 31). In this connection, it is possible to deduce the following hypothesis: information security is the key function of the information infrastructure of contemporary society.

Data Collection and Methods

The research design for this study will be qualitative to ensure that the gathered data will be comprehensive and in-depth. The data will be gathered in two different approaches, which are theoretical and practical. To be more precise, the research will include both the literature overview and data collection from the sample.

Theoretical analysis of scientific publications on the topic of the research will be conducted. It will allow understanding of the theoretical basis and serve as a starting point for the formation of the study population. In addition, the sociological methods will be used in the study. In particular, questionnaires and interviews will be developed to obtain the required feedback. Questionnaires and interviews will consist of closed and open-end questions in order to gain the deepest data for future analysis. Moreover, it will enable summarizing the experience of the sample group. One of the research problems is to implement a comprehensive study of the issue, which implies analysis, source study, comparative method, and social modeling.

The sampling group will be a population aged 18-70 years. Mostly, the sampling group will be residents of the city of various backgrounds and engaged in varied occupations. Overall, 40 respondents of this group will be interviewed in order to investigate the efficiency of information and communication in the context of ensuring information security and intellectual property protection. Apart from that, the 15 employees of PR-structures will be interviewed. Regarding the reliability of the collected data and information, the validity within a 3-7% error will be accepted. This measure is considered a commonly accepted error range.

Concepts and Measures

The chief concept considered and discussed in this study is the information sphere. It includes information interaction, the exchange of it (infrastructure), and social relations, which are formed as a result of the transfer and storage of information among people (Gupta and Dhami 51). In modern society, new forms of mass communication emerge; therefore, the appropriate paradigm for the regulation of information security should also appear timely (Talabis and Martin 201). In this context, the opinion polls are the most important because they are aimed at obtaining qualitative values and assessments. It is also essential to assess the nature of the information due to the fact that it requires a change in the communication settings.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

In connection to that which is discussed above, it is crucial to emphasize that the results of sociological research lead to increasing information security because they are the main source of information (Bughin and Chui 5). The main advantages of this study approach in relation to the subject are the verifiable results, feasible resource consumption, and objectivity. In addition, it is important to mention the fact that, in modern society, the interaction of social groups is similar to the management of communicative processes. Appropriately, the research will provide an opportunity to identify and analyze the risks associated with these processes.

All of the collected data will be measured to provide a statistical association. However, it is essential to note that this type of measurement can impose possible limitations. For instance, there might be errors at different stages of information gathering, as well as weak or ineffective awareness of information consumers.

Discussion

The reliance on the provisions set forth in the writings of social scientists and psychologists will allow developing a set of conclusions in terms of the study methodology. Therefore, the basis of the research will be revealed in a systematic approach using the categorical and conceptual apparatus of information theory, sociology, and psychology. In general, the validity and reliability of the research results are not to be questioned. It is due to the fact that their reasonableness can be determined by consistent theoretical provisions. Moreover, the research logic and complex application of theoretical and empirical methods of the sociological study imply the validity and reliability of the obtained results. In addition, the nature of the sociological study does not imply any ethical issues to be considered or addressed.

Conclusion

Thus, the issue of information security requires a thorough approach to the study. In order to carry out the research, the theoretical foundations and concepts will be analyzed to form the basis for the polling of the sample group. The qualitative method will enable gathering the comprehensive data and analyzing them through the application of theoretical approaches promoted by the literature review. It should be stated that in the course of the research, the hypothesis would be either proved or invalidated per the study results. Overall, the theoretical and practical significance of the study lies in the fact that it will deepen the concept of information security and identify the current trends. The results will allow exploring the described problems further and improving the existing information policy.

Appendix 1

Sample questions for the population group:

  1. Do you know what is meant by “information security”? Yes-No.
  2. Do you think that the information used on the Internet/ the one you enter on the Internet is secured properly? Yes-No. Why do you think so?
  3. Do you think that the information you provide to your friends is secured properly? Yes-No.
  4. Does the place where you study/work part-time/are occupied in any activity provides you with the information on data security?
  5. Do you think that the information you provide to your employer is secured properly? Yes-No.
  6. Does your employer provide you with information about data security?
  7. Are you aware of the policies/regulations related to disclosure of confidential information?
  8. Please, evaluate information security dynamics from 1 to 5. (1 – very poor, 5 – very good).
  9. Please, rate the level of protection of personal information from 1 to 5. (1 – very poor, 5 – very good).
  10. Please rate your level of confidence in the information resources from 1 to 5. (1 – very poor, 5 – very good).

Appendix 2

Survey for the PR-structures:

  1. What is the structure of information systems within your organization?
  2. Does your company perform cross-border transfer of personal data? Yes-No.
  3. Are there any documents in the organization that protect personal data? Yes-No.
  4. Are the computers that store personal data located on the local network? Yes-No.
  5. Do the information systems that you use proceed any personal data revealing racial or ethnic origin, political opinions, and religious beliefs of employees? Yes-No.
  6. Does your organization use anti-virus protection? Yes-No. If yes, what type?
  7. Does any software or hardware protect the information? Yes-No. If yes, what type?
  8. Please select the appropriate: personal data security breach can result in:
    1. significant negative effects;
    2. minor negative consequences;
    3. it does not lead to negative consequences.

Works Cited

Al-Fedaghi, Sabah. “A Conceptual Foundation for Data Loss Prevention.” International Journal of Digital Content Technology and its Applications, vol. 5, no. 3, 2011, pp. 293-303.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Alwi, Najwa, and Fan, Ip-Shing. “E-learning and Information Security Management.” International Journal of Digital Society (IJDS), vol. 1, no. 2, 2010, pp. 148-156.

Bughin, Jacques, and Chui, Michael. “The Rise of the Networked Enterprise: Web 2.0 Finds Its Payday.” McKinsey Quarterly, vol. 4, 2010, pp. 3-8.

Gupta, Ashish, and Dhami, Anil. “Measuring the Impact of Security, Trust and Privacy in Information Sharing: A Study on Social Networking Sites.” Journal of Direct, Data and Digital Marketing Practice, vol. 17, no. 1, 2015, pp. 43-53.

Meyer, Patrick, and Zhu, Shi. “Fair and Equitable Measurement of Student Learning in MOOCs: An Introduction to Item Response Theory, Scale Linking, and Score Equating.” Research & Practice in Assessment, vol. 8, no. 1, 2013, pp. 26-39.

Talabis, Mark, and Martin, Jason. Information Security Risk Assessment Toolkit. Newnes, 2012.

Print
Need an custom research paper on Information Security as a Social Interaction Form written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, January 23). Information Security as a Social Interaction Form. https://ivypanda.com/essays/information-security-as-a-social-interaction-form/

Work Cited

"Information Security as a Social Interaction Form." IvyPanda, 23 Jan. 2024, ivypanda.com/essays/information-security-as-a-social-interaction-form/.

References

IvyPanda. (2024) 'Information Security as a Social Interaction Form'. 23 January.

References

IvyPanda. 2024. "Information Security as a Social Interaction Form." January 23, 2024. https://ivypanda.com/essays/information-security-as-a-social-interaction-form/.

1. IvyPanda. "Information Security as a Social Interaction Form." January 23, 2024. https://ivypanda.com/essays/information-security-as-a-social-interaction-form/.


Bibliography


IvyPanda. "Information Security as a Social Interaction Form." January 23, 2024. https://ivypanda.com/essays/information-security-as-a-social-interaction-form/.

Powered by CiteTotal, easy citation creator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1