Information Systems Quality – Security

28 Jan

When developing a framework to assess information system quality, one must first look at the various aspects that can affect such quality. To build on agblogail idea of dividing information systems quality into components in order to develop a useful framework I will be looking at the area of Information Security. Information system/technology security can be defined “as  the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats” [1].

Information is an asset to all organisations so having some sort of security to protect it is vital to any organisation. All organisations irrespective of the type of business they do believe that data protection and security is vitally important to their organisation. For example in the article ‘Quality Risk Analysis’ they offer the example of developing a new online bank application. This newly designed application permits users to login over the internet and allows them to conduct such activities as transferring money. With this type of an application comes a number of risks for example people hacking into the account and making unauthorised transactions. “For such an application, security is clearly a major quality characteristic. In the area of security, risks to system quality include the possibility that criminal hackers gain unauthorized access to other customers’ accounts or that hackers intercept account information in transit between the data centre and customers’ PCs” [2].

The above example is why when developing an IS quality framework to help managers to determine the quality of there IS services and outputs managers need to look at what security measures they have to protect their data.



[2] Black, R. (2008) ‘Quality Risk Analysis.’ RBCS INC. Available online @


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: