THE DEVELOPMENT OF AN INFORMATION SYSTEM SECURITY MANAGEMENT MODEL FOR DIGITAL MEDIA PLATFORMS

Main Article Content

Puripat Keawtathanawatthana
Danai Chotseang
Liu Yin
Sirinya Siranan
Kanyamon Kanchanathaveekul

Abstract

This study aimed to (1) examine information system security management strategies of digital media platforms, and (2) develop an information system security management model for digital media platforms. A mixed-methods research design was employed, integrating quantitative and qualitative approaches.The quantitative component involved data collection from 400 users of online platforms across four regions of China: Eastern China (Shandong Province), Northern China (Liaoning Province), Western China (Sichuan Province), and Southern China (Guangdong Province). The data were analyzed using descriptive statistics, including frequency, percentage, mean, and standard deviation, to explain respondents’ demographic characteristics, levels of perception, and opinions regarding information system security management strategies on digital media platforms. The qualitative component consisted of in-depth interviews and focus group discussions with 20 key informants, including government officials, executives, and online platform developers responsible for information system security governance. Qualitative data were analyzed using content analysis through systematic procedures of interview transcription, coding, data categorization, and thematic synthesis to identify key patterns, strategies, and practical insights related to information system security management.


Findings


  • The findings revealed that digital media platforms adopt five key information system security management strategies: (1) establishing an information security management system; (2) defining information system security objectives; (3) formulating security governance and regulatory policies; (4) developing human resources in information system security; and (5) enhancing user trust and confidence in digital media platforms.

  • The model development results indicated that the information system security management model for digital media platforms was derived from the integrated analysis and synthesis of quantitative and qualitative data. The model was subsequently developed into a CIA Triad Model, consisting of three core components: ensuring information confidentiality through authorized access control; maintaining information integrity to prevent unauthorized modification or data manipulation; and ensuring the continuous and secure availability of information systems. The proposed model provides a comprehensive framework encompassing technical, managerial, and governance dimensions and can be applied as a practical guideline for enhancing information system security management in digital media platforms.

Article Details

Section
Article

References

Chen, Q., & Peng, Y. (2022). Traffic rewards, algorithmic visibility, and advertiser satisfaction: How Chinese short-video platforms cultivate creators in stages. Convergence: The International Journal of Research into New Media Technologies, 28(6), 1537–1554. https://doi.org/10.1177/1354856522112 06

Chen, S. (2023). How social media can solve the problem of “filter bubbles” under the new media algorithm recommendation mechanism: The example of TikTok. Proceedings of the 2023 2nd International Conference on Social Sciences and Humanities and Arts (SSHA 2023), 1284–1288. Atlantis Press. https://doi.org/10.2991/978-2-38476-062-6_165

Paat, Y., & Markham, C. (2021). Digital crime, trauma, and abuse: Internet safety and cyber risks for adolescents and emerging adults in the 21st century. Social Work in Mental Health, 19(5), 367–386. https://doi.org/10.1080/ 15332985.2021.1914085

Postman, N. (2000). The humanism of media ecology. Proceedings of the Media Ecology Association, 1, 10–16.

Senapati, A., et al. (2023). Digital 2023: Global overview report. DataReportal (We Are Social & Meltwater).

Seo, M. (2021). Adolescents’ exposure to online risks: Gender disparities and vulnerabilities related to online behaviors. International Journal of Environmental Research and Public Health, 18(4), 2185. https://doi.org/ 10.3390/ijerph18042185

Yeung, K. (2018). Algorithmic regulation: A critical interrogation. Regulation & Governance, 12(4), 505–523. https://doi.org/10.1111/rego.12132

Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. New York: PublicAffairs.