The role of intrusion detection systems in electronic information security: From the activity theory perspective

Purpose – The purpose of this paper is to investigate the effectiveness of intrusion detection systems as an access control supplement in protecting electronic information resources and networks in information‐centric organisations. The study focuses on the strengths and vulnerabilities of intrusion detection systems (IDSs).Design/methodology/approach – A qualitative case study is conducted with a retail organisation, and an educational institution in Cape Town, South Africa. Using purposive sampling, interviews are held with network administrators of sample institutions to unpack security priorities and the functionalities of IDSs, the significance of the system in concept, whether it is understood within network departments, the cost factor, and its value in securing networks against all possible security challenges. The activity theory is applied as a lens to understanding the security process, and to inform a future security frameworks and research initiatives.Findings – The findings are clear. Althou...

[1]  Randy Weaver,et al.  Guide to Network Defense and Countermeasures , 2003 .

[2]  Earl R. Babbie,et al.  The practice of social research , 1969 .

[3]  J F Gilgun Decision-making in interdisciplinary treatment teams. , 1988, Child abuse & neglect.

[4]  Bonnie Kaplan,et al.  Qualitative Research Methods for Evaluating Computer Information Systems , 2005 .

[5]  Wanda J. Orlikowski,et al.  Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..

[6]  A. N. Leont’ev,et al.  Activity, consciousness, and personality , 1978 .

[7]  Michael D. Myers,et al.  A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..

[8]  R. Yin Case Study Research: Design and Methods , 1984 .

[9]  L. Vygotsky Mind in Society: The Development of Higher Psychological Processes: Harvard University Press , 1978 .

[10]  Ranjit Kumar,et al.  Research Methodology: A Step-by-Step Guide for Beginners , 1999 .

[11]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[12]  Geoff Walsham,et al.  Interpreting Information Systems in Organizations , 1993 .

[13]  A. Kellerman,et al.  The Constitution of Society : Outline of the Theory of Structuration , 2015 .

[14]  Mikko Korpela,et al.  Activity Theory in information systems research and practice - theoretical underpinnings for an information systems development method , 2007, Inf. Res..

[15]  Richard Baskerville,et al.  A Workshop on Two Techniques for Qualitative Data Analysis: Action Research and Ethnography , 1992, ICIS.

[16]  M. Castells Rise of the Network Society: The Information Age: Economy, Society and Culture , 1996 .

[17]  S. Deetz Crossroads---Describing Differences in Approaches to Organization Science: Rethinking Burrell and Morgan and Their Legacy , 1996 .

[18]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[19]  John W. Creswell,et al.  Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2010 .

[20]  Mark Ciampa Security Awareness: Applying Practical Security in Your World , 2004 .

[21]  Debra M. Amidon,et al.  Innovation strategy for the knowledge economy : the ken awakening , 1997 .

[22]  Thomas H. Davenport,et al.  Book review:Working knowledge: How organizations manage what they know. Thomas H. Davenport and Laurence Prusak. Harvard Business School Press, 1998. $29.95US. ISBN 0‐87584‐655‐6 , 1998 .

[23]  Allen S. Lee,et al.  Information systems and qualitative research , 1997 .

[24]  A. Klinghoffer,et al.  A Plan for Action , 2019, The New Examination System - GCSE.

[25]  Bruce C. Straits,et al.  Approaches to social research , 1993 .

[26]  Geoff Walsham,et al.  Interpretive case studies in IS research: nature and method , 1995 .