Detalhes bibliográficos
Ano de defesa: |
2023 |
Autor(a) principal: |
Chagas, Ana Paula Monteiro Almeida |
Orientador(a): |
Carvalho, Telma de |
Banca de defesa: |
Não Informado pela instituição |
Tipo de documento: |
Dissertação
|
Tipo de acesso: |
Acesso aberto |
Idioma: |
por |
Instituição de defesa: |
Não Informado pela instituição
|
Programa de Pós-Graduação: |
Pós-Graduação em Ciência da Informação
|
Departamento: |
Não Informado pela instituição
|
País: |
Não Informado pela instituição
|
Palavras-chave em Português: |
|
Palavras-chave em Inglês: |
|
Área do conhecimento CNPq: |
|
Link de acesso: |
https://ri.ufs.br/jspui/handle/riufs/18741
|
Resumo: |
Highlighting the complexities inherent to phenomena related to information security in the current context, characterized by virtual and hybrid environments in which information is accessed simultaneously by different sectors, through continuous flows mediated by information systems and information resources accessed by servers, a substantial concern is identified related to potential vulnerabilities in the use of systems and cyber threats. This problem is directly linked to the interaction between the user, technology and system. The triad composed of research elements of interest to Information Science (IC) - users, technology and systems - fosters crucial research aimed at information security. In this context and facing this problem, the present study proposed as a general objective to identify the behavior of employees of the Federal Prosecutor's Office in Sergipe (PU/SE) in relation to the user interface, technology and system, with an emphasis on information security, aiming to create a Manual of Good Information Security Practices for system users. The research was conducted under the theoretical foundations of authors who explore the theme in an interdisciplinary way, being classified as bibliographic, field research and action research of an applied and qualitativequantitative nature. During the investigation, information was explored as a resource of great value, inserted in the context of computerized information systems, including Information Management, Computerized Document Archival Management Systems (SIGAD), with special attention to user behavior, information security and best practices, as well as the control of cyber threats. After carrying out the diagnosis and SWOT analysis as a strategic tool to guide interventions in PU/SE, the research achieved its objectives, concluding that, through the exploration of users' impressions, the main threats perceived by them could be clearly identified. This allowed the research to not only provide a more comprehensive view of the perception of information security in the organization, but also lay the foundation for proposing improvement measures and accurately identifying existing risk incidents. At the same time, it revealed a set of good practices that, in some cases, might not have been properly considered by the organization previously. By mapping the main elements identified in the qualitativequantitative analysis, representing categories of threats and failures in information security, a complete view of the information security phenomenon was obtained, approached in a scientific and holistic manner by users. Finally, it was found that this analysis had an interventionist character, enabling the alignment and validation of the research objectives through the development of the educational product, the "Manual of Good Information Security Practices", thus consolidating the results obtained. The research highlights the continued importance of educating and preparing users to face emerging threats to information security in the digital environment. |