Skip to main content
Log in

Information security research classification for future multimedia environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In spite of the advancement of information security (IS) technology, information leakage incidents and accidents are continuously occurring. Its reason is because only technical countermeasures are devised rather than implementing countermeasures based on business perspective regarding IS. Accordingly, the purpose of this study is to design a classification system in the area of IS to solve such problem and seek balanced advancement, as well as examine the trend of IS researches that have been conducted. Upon designing the classification system based on the areas of IS technology and IS management for the IS academic areas, Korea domestic and international academic journals in the area of IS were selected to research and analyze theses that have been published in the last 5 years. The research result showed that there were more studies on IS technology area than IS management area, thereby confirming the greater research emphasis in the area of technology. In specific according to area, number of Korea domestic researches on infrastructure security technology was the highest in the area of IS technology. In the case of international researches, number of researches on the security of infrastructure was the highest. As for the IS management area, number of Korea domestic researches on IS level diagnosis was the highest, while number international researches on IS human resource management was the highest. The significance of this study is to contribute to the balanced advancement of IS area by designing IS classification system to present IS research trend and future research direction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Allen m (1999) The role of meta-analysis for connecting critical and scientific approaches: the need to develop a sense of collaboration. Crit Stud Mass Commun 16:373–379

    Article  Google Scholar 

  2. Cockcroft S (2002) Securing the commercial internet: lessons learned in developing a postgraduate course in information security management. J Inf Syst Educ 13(3):205–210

    Google Scholar 

  3. Cooper H (2009) “Research synthesis and meta-analysis: A step-by-step approach” Sage Publications

  4. Logan P (2002) Crafting an undergraduate information security emphasis within information technology. J Inf Syst Educ 13(3):177–182

    Google Scholar 

  5. Nelson HD, Vesco KK, Haney E, FU R, Nedrow A, Miller J, Nicolaidis C, Walker M, Humphrey L (2006) Nonhormonal therapies for menopausal hot flashes: systematic review and meta-analysis. JAMA 295(17):2057–2071

    Article  Google Scholar 

  6. Veiga AD, Eloff JH (2007) An information security governance framework. Inf Syst Manag 24(4):361–372

    Article  Google Scholar 

  7. Venter H, Eloff JH (2003) A taxonomy for information security technologies. Comput Secur 22(4):299–307

    Article  Google Scholar 

  8. Wallace WI (1992) Metatheory, conceptual standardization, and the future of sociology. In: Ritzer G (ed) Metatheorizing. Sage, New York, pp 53–68

    Google Scholar 

  9. Wolf FM (1986) “Meta-analysis: Quantitative methods for research synthesis,” Sage Publications

  10. Wright MA (1998) The need for information security education. Comput Fraud Secur 1998(8):14–17

    Article  Google Scholar 

  11. Wu Y, Lee M, Tsai C (2009) Research trends in science education from 2003 to 2007: a content analysis of publications in selected journal. Int J Sci Educ 31(15):1999–2020

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2015-H8501-15-1018) supervised by the IITP (Institute for Information & communications Technology Promotion).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hangbae Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, H., Kim, Y. & Chang, H. Information security research classification for future multimedia environment. Multimed Tools Appl 75, 14795–14806 (2016). https://doi.org/10.1007/s11042-015-2638-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2638-x

Keywords

Navigation