18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

of the techniques, methods and procedures adopted in terminology work to carry out<br />

terminology research.<br />

We propose to start with literature review in identifying new IT threats and<br />

vulnerabilities continue with a case study regarding information strategy for online<br />

business and proposal to eliminate threats and vulnerabilities by using outsourcing<br />

and cloud computing.<br />

As we know, information strategy must be aligning to IT novelty, so the future studies<br />

will be according to new technologies for online business to improve the economic<br />

performance.<br />

The next steps present the flow of the research:<br />

� Defining the research and development of its approach<br />

The first step in the research was the definition of the problem to study. To define<br />

correct strategies, it was considered important the existing relevant information, and<br />

establishes the necessary information for making decision. The definition of the<br />

problem involved discussions with decision makers of companies, interviews with<br />

experts in the field, secondary data analysis and qualitative research sometimes, such<br />

as "focus group".<br />

This technique was used to see how viable is a new software product or a new service<br />

as proposed for implementation. We set up a group of 8-9 managers, from a company<br />

to discuss some of the issues on which we have proposed. The group was led by us<br />

together with an IT specialist – manager moderator at company which conducted the<br />

interview. He started the discussion at a very general level, and then, gradually, was<br />

focused on the subject in question, in the form of information security along the flow<br />

of information; the participants were not told before that is the subject of the question,<br />

but only the area of interest.<br />

Focus group website has proven to be useful for understanding the perceptions and<br />

behavior of the users' computer system; generating new ideas for software or<br />

hardware products located at maturity; getting impressions, information related to the<br />

launch of new software products; the development of concepts, new ideas in regards<br />

to advertising for products developed in society; reactions to the change in the price of<br />

services, obtaining preliminary reactions to specific marketing programs.<br />

� The research plan<br />

Research plan represented a guide for conducting research. Established procedures for<br />

obtaining the required data and its purpose was to present a study, which give answers<br />

on how to identify security risks, security breaches and provide information related to<br />

their appearance for the preparation of a detailed final conclusions with<br />

recommendations.<br />

Research plan involved taking the following steps: analysis of secondary data,<br />

qualitative research, quantitative methods of data collection, the definition of the<br />

necessary information, documentation, sample proposal and setting the size of the<br />

sample, the data analysis plan (security policy, organization, management of<br />

information security, human resources security, physical security and the<br />

environment, communication and management of logical operations, control of access<br />

~ 662 ~

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!