2017
DOI: 10.1108/ajim-08-2016-0124
|View full text |Cite
|
Sign up to set email alerts
|

Information systems security practices in social software applications

Abstract: Purpose-The paper aims to investigate the current Information Systems Security (ISS) practices of the Social Software Application (SSA) users via the Internet. Design/methodology/approach-The paper opted for a systematic literature review (SLR) survey on ISS and its practices in SSAs between 2010 and 2015. The studiy includes a set of 39 papers from among 1,990 retrieved papers published in thirty-three high impact journals. The selected papers were filtered using the Publish or Perish (PoP) software by Harzin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 66 publications
0
8
0
Order By: Relevance
“…The SME infrastructure also requires software to link disparate applications and enable data to flow freely amongst different parts of the business. Information systems manufacturing techniques allow the development of advanced SCM (Ellis 2017;Michael & Mike 2014;Tamrin, Norman & Hamid 2017). As a result of EAA adoption, it appears that WAA alone is not the causative factor of SCM, resulting in a monolithic three-tier model that includes microservice architecture, cloud architecture and eventdriven architecture.…”
Section: Web Application Architecturementioning
confidence: 99%
“…The SME infrastructure also requires software to link disparate applications and enable data to flow freely amongst different parts of the business. Information systems manufacturing techniques allow the development of advanced SCM (Ellis 2017;Michael & Mike 2014;Tamrin, Norman & Hamid 2017). As a result of EAA adoption, it appears that WAA alone is not the causative factor of SCM, resulting in a monolithic three-tier model that includes microservice architecture, cloud architecture and eventdriven architecture.…”
Section: Web Application Architecturementioning
confidence: 99%
“…Authentication and access control always remained the core area of research in every computing system development [34], [35]. Involvement of the third party for certification of OSN applications is suggested in [36], [37]. The openness of OSN users and application capability for information classification is to be taken care of.…”
Section: B Osns Modelsmentioning
confidence: 99%
“…Banks are not well suited to conduct a hybrid assessment (experiment and data) and derive optimal conclusions. It fails to respond timely and effectively to such fraud events (Li et al, 2020;Tamrin et al, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Fraud response systems should detect cyber frauds at the earliest (Dimitrijevic et al, 2017) and dynamically manage large amounts of data (Udeh and Ugwu, 2018). It should prioritize (Roy and Prabhakaran, 2022) and prevent fraud at its earliest stage (Braithwaite, 2010;Tamrin et al, 2017). Prioritizing frauds will enable timely and cost-efficient fraud mitigation measures for high-priority frauds.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation