عوامل مؤثر بر ایجاد امنیت در شبکه های اطلاعاتی اداره کل زندان های استان سیستان و بلوچستان و اولویت بندی آنها

نوع مقاله : مقاله پژوهشی

نویسندگان

1 استادیار، عضو هیات علمی دانشگاه سیستان و بلوچستان، زاهدان، ایران.

2 مربی، عضو هیات علمی دانشگاه سیستان و بلوچستان، زاهدان، ایران.

چکیده

     امروزه داشتن یک سیستم فناوری اطلاعات به معنای موفقیت یا تضمین نتایج خوب برای سازمان نیست، مگر اینکه سازمانها اطمینان حاصل کنند از اینکه پروتکل­ها و رویه های امنیت اطلاعاتی آنها به خوبی طراحی شده و دارایی­های فناوری اطلاعات آنها در برابر تهدیدات خارجی و داخلی محافظت می­ شوند. هدف تحقیق حاضر شناسایی عوامل مؤثر بر ایجاد امنیت در شبکه‌های اطلاعاتی اداره کل زندان­های استان سیستان و بلوچستان و اولویت بندی آنها می باشد. برای این منظور ابتدا فهرستی از معیارهای حائز اهمیت تدوین شد و سپس از طریق تکمیل نمودن پرسشنامه، عوامل مؤثر بر ایجاد امنیت شبکه های اطلاعاتی الکترونیکی اداره کل زندان‌ها مشخص گردید. جامعه آماری در این تحقیق شامل کارشناسان و متخصصان خبره و اساتید دانشگاهی می شود که آشنایی کامل با کلیات امنیت شبکه را نیز داشته باشند که بدلیل محدودیت جامعه آماری، نمونه‌گیری ضرورتی ندارد. سپس با تجزیه و تحلیل داده­ها از طریق روش تحلیل سلسله مراتبی فازی معیارها وزن­دهی و رتبه بندی شدند. نتایج تحقیق حاکی از آن است که حوزه زیرساخت و محتوی و کاربرد از دیدگاه مدیران و خبرگان تصمیم‌گیرنده دارای بالاترین اهمیت است.

کلیدواژه‌ها


عنوان مقاله [English]

Identifying and Prioritizing the Effective Factors of the Information Networks Security of Sistan and Baluchestan Province Prisons

نویسندگان [English]

  • Hadi Esmaeeli 1
  • Shahpour Rahmani 2
  • Ahmad Kazemi 2
1 Director of Virtual Education center/Sistan and Baluchestan University
2 Instructor, Department of Computer Science, Faculty of Mathematics, Statistics and Computer Science, Sistan and Baluchestan University, Zahedan, Iran
چکیده [English]

Abstract
The existence of information technology (IT) system, nowadays, does not guarantee appropriate outcomes for organizations, unless they ascertained their information security protocols and procedures are well-designed and their IT assets are protected from external and internal threats. The purpose of the present study is to identify and prioritize the factors which are influential in the security of the information networks of prisons of Sistan and Baluchestan (S&B) province. To this end, first a list of important criteria was compiled. Then, the effective factors of the security of electronic information networks of Prison Directorate General of S&B were identified by filling out a questionnaire. The population of the study were experts, specialists and university professors who were fully acquainted with the concept of IT network security. Since the statistical community was limited, there was no need for sampling. The criteria were then weighted and ranked using fuzzy analytical hierarchy process (AHP). The results of the study indicated that the field of infrastructure, content and application are of the highest importance from the perspectives of policy makers and prison governors.
Introduction
Some institutions and organizations have more important information from this regard, information security is more important for them. The General Directorate of Prisons in Sistan and Baluchestan Province has vital information resources, the loss of which and its leakage can cause great harm and violate the privacy and dignity of individuals; For example, CCTV images that may provide valuable information to abusers inside and outside the organization. The organization has an independent workgroup for information technology management, in which the number of experts with related education is more than ten. In this sub office, there are software systems: accounting and finance, warehousing, salaries and property, secretariat, administrative correspondence and archives. The data collected to identify the current IT situation of the General Directorate of Prisons in the fields of software, hardware, network and human resource, Indicates the lack of software to expedite internal affairs and appropriate security hardware within the organization and appropriate procedures for establishing communication network security.
Case study
This study intends to identify and prioritize the factors affecting the security of information networks in the General Directorate of Prisons of Sistan and Baluchestan Province.
Theoretical framework
Since the phenomenon of information technology in the General Directorate of Prisons of the province and in particular Zahedan Prison is not very old, determining its strategies requires multifaceted information; In this research, a pluralistic approach will be followed in the method and tools of data collection. In other words, this research tries to combine the characteristics of quantitative data (survey) and qualitative data (content analysis and archival studies) with a pluralistic approach and thus add to the richness of the research. The pluralistic approach in collecting information about the security of electronic information networks in the province's prisons and prioritizing them allows qualitative and in-depth analyzes to be combined with statistical analysis, increasing the internal validity of the test and the reliability of the collected information. Also reveal aspects of the research topic that may have been hidden.
In terms of the purpose of this research, it is a descriptive-field research. Most of the analyzes performed in different stages of the research are quantitative and qualitative methods that are performed in the form of document analysis, stakeholder analysis and quantitative data analysis.
Methodology
In this research, a questionnaire was used as one of the research tools and according to the scope of the subject and the multiplicity of indicators, questionnaires consisting of several sections were developed and in order to collect the required data, experts and those involved in ICT development in Some organizations as well as the General Directorate of Prisons were studied as a research community. Through face-to-face interviews and completing a questionnaire, the opinions of experts and managers of the studied organizations on adding, deleting or merging criteria were obtained. According to the results of this questionnaire and interviews, the most important criteria in the four fields of "infrastructure, content and application" and "policies and strategies" and "institutions" and "human resources" and 23 sub-criteria identified in the framework of these four areas was categorized. To obtain the relative weight of the four main fields as well as the identified sub-criteria, questionnaires were designed based on pairwise comparisons and fuzzy Analytical Hierarchy Process (AHP) method. These questionnaires were answered by employees and information technology experts of government organizations. In order to analyze the data with a fuzzy approach, the numbers obtained from the questionnaires should be converted into their equivalent triangular fuzzy numbers. To analyze these data, fuzzy AHP method and Chang’s developmental analysis method were used.
Discussion and Results
The results obtained from the implementation of fuzzy AHP algorithm and Chang developmental analysis method on the research data extracted from the questionnaires show that the infrastructure, content and application context with a relative weight of 0.314 is the most important. After infrastructure, content and application, human resources, policy and strategy and institutions with the weight of 0.272, 0.231 and 0.183 are in the next positions, respectively. The incompatibility rate of comparisons in this section is (CIg = 0.09) and (CIm = 0.09) and since this value is less than zero, the compatibility of the questionnaires is acceptable.
Conclusion
The ranking of quad criteria for improving the security of electronic information networks of prisons in Sistan and Baluchestan province indicates that the field of infrastructure, content and application has the highest importance for the managers and decision-making experts. This implies that the overall managerial attitude of the general administration is only based on the creation of technical-telecommunication platforms. The existence of such an attitude seems to be promising to increase the level of infrastructure and content and human resources. However, the factor of infrastructure, content and application is decisive and can be considered as the first evaluation criterion. In addition to the infrastructure, content and application context, the human resources context is also of great importance. From the point of view of the experts of the society which has been studied, the two contexts of "policies and strategies" and "institutions" are less important than the two contexts of "infrastructure, content and application" and "human resources". This indicates that the factors related to these fields are of lower importance compared to the criteria that are directly related to the context of infrastructure, content and application and human resources.

کلیدواژه‌ها [English]

  • Prison
  • Information Networks
  • Information Security
منابع فارسی
بحرانی، پیام و یزدی، مهران (1388). اهمیت و لزوم سیستم مدیریت امنیت اطلاعات در دولت الکترونیک. دومین کنفرانس بین المللی نظام اداری الکترونیکی، مرکز همایش های علمی طاپکو، تهران
حریری، نجلا و نظری، زهرا (1391). امنیت اطلاعات در کتابخانه‎های دیجیتالی ایران. فصلنامه علمی-پژوهشی کتابداری و اطلاع رسانی، شماره دوم، جلد 15
حقیقی، محمد و سیحون، علیرضا (1388). ارائه مدل بلوغ الکترونیکی برای فرآیندهای ارائه خدمات در صنعت بیمه کشور وآزمون آن در شرکت بیمه پارسیان. فصلنامه صنعت بیمه، سال  بیست وسوم، شماره ٣ و ٤، پاییز و زمستان ١388، صص 111-77
خالقی، محمود. راهنمای پیاده­سازی سیستم مدیریت امنیت اطلاعات. تهران: دبیرخانه شورای عالی امنیت فضای تبادل اطلاعات کشور،۱۳۸۳
فقیهی, ابوالحسن, بامدادصوفی, جهانیار. (1375). کثرت گرایی روش تحقیق در پژوهش های سازمانی. مطالعات مدیریت (بهبود و تحول)، 6(21.22)، 54-71.
قاسمی شبانکاره، کبرا;  مختاری، وحید و امینی لاری، منصور (1386). امنیت و تجارت الکترونیکی. چهارمین همایش ملی تجارت الکترونیک. تهران.
کاشفی، امید و زمانی­فر، آزاده(1391). بلوغ دولت الکترونیک. تهران: دبیرخانه شورای عالی اطلاع رسانی
 
References
Bohrani, P. and Yazdi, M. (2019). The Importance and Necessity of Information Security Management System in E-Government. 2nd International Conference on Electronic Administration System, TAPCO Scientific Conference Center, Tehran. (In Persian)
Broderick, J. S. (2006). ISMS, security standards and security regulations. Information Security Technical Report. 11(1), pp. 26–31.
Faghihi, A., Bamdadsofi, J. (1999). " Triangulation in organizationl studies ". Management Studies in Development and Evolution, 6(21.22), 54-71. (In Persian)
Ghasemi Shabankareh, C.; Mokhtari, V. and Amini Lari, M. (2017). Security and E-Commerce. 4th National Conference on E-Commerce. Tehran. (In Persian)
 Haghighi, M. and Seyhoun, A. (2019). Presenting an Electronic Maturity Model for the Processes of Providing Services in the Iranian Insurance Industry and its Testing in Parsian Insurance Company. Insurance Industry Quarterly, 26(2 and 3), pp. 77- 111. (In Persian)
Hariri, N. and Nazari, Z. (2012). Information Security in Iranian Digital Libraries. Journal of Library and Information Science, 16(2), pp. 61-90. (In Persian)
HO, A, T. (2002). “Reinventing Local Governments and the Egovernment Initiative”. Public Administration Review, International Journal of Information Management, 62(4), pp. 434-444.
Jouinia, M.; Ben, L.; Ben Arfa Rabai L. and Ben Aissa, A. (2014). " Classification of security threats in information systems". Procedia Computer Science, 32, pp. 489 – 496.
Kashefi, O. and Zamani Far, A. (2012). E-Government Maturity. Tehran: Secretariat of the Supreme Information Council. (In Persian)
Khaleghi, M. (2015). Implementation Guide for Information Security Management System. Tehran: Secretariat of the Supreme Council of the Security of the Information Exchange Space of the State. (In Persian)
Kritzinger E. and Smith E. (2008), " Information security management: An information security retrieval and awareness model for industry", Computers & Security, 27(5-6), pp. 224-231.
Mir, M.; Ghasemi M. and Dehghani M. (2019), Evaluation of Entrepreneurship Attitudes among Prisoners of Zahedan Central Prison, National Conference on Economics, Development Management and Entrepreneurship with the Approach of Supporting Iranian Goods, Zahedan. (In Persian)
Ronaghan, S. A. (2017). “Benchmarking E-government: A Global Perspective. Assessing the Progress of The UN Member States”. United Nations Division for Public Economics and Public Administration, New York.
Safianu, O. and Twum, F. (2016). "Information System Security Threats and Vulnerabilities: Evaluating the Human Factor in Data Protection". International Journal of Computer Applications. 143(5), pp. 8-14.
Susanto, H., Almunawar, M.N., & Tuan, Y.C. (2011). Information Security Management System Standards: A Comparative Study of the Big Five. International Journal of Electrical & Computer Sciences IJECS-IJENS. 11(5).