ABSTRACT

This chapter focuses on one of the key steps taken towards research success that is the adoption of RM. In the context of this research, methodology discusses the procedures, objectives, respondents, software development issues, and data analysis about information security aspects. The research has four stages. They are Literature Survey; Proposed Framework; Software Development; Software Deployment and Testing. The selection of respondents was carried out by systematic and selected sampling criteria, which was chosen by specific consideration and purpose. Based on the Price Waterhouse Cooper consultants findings, the authors selected ten organizations which can be classified into 6 clusters as our respondents to help us improve and refine the framework and to test the application software derived from the framework. Questionnaires were distributed to respondents to collect information on security related issues, functions and technical requirements from users. The questionnaire was divided into four main sections: attitudes to information security, security awareness, security standards and framework/ comprehensive evaluation tools.