Information Security management: A human challenge?

被引:70
作者
Department of Informatics and Sensors, Cranfield University, Swindon, SN6 8LA, United Kingdom [1 ]
机构
[1] Department of Informatics and Sensors, Cranfield University, Swindon
来源
Inf Secur Tech Rep | 2008年 / 4卷 / 195-201期
关键词
Awareness; Change management; Communication; Human factors; Information Security; Management; Organisational culture;
D O I
10.1016/j.istr.2008.10.006
中图分类号
学科分类号
摘要
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a personal and social identity that they bring with them to work. The challenge that faces organisations is to manage this while trying to achieve the optimum configuration of resources in order to meet business objectives. The paper considers the challenges for Information Security from an organisational perspective and develops an argument that builds on research from the fields of management and organisational behaviour. It concludes that the human challenge of Information Security management has largely been neglected and suggests that to address the issue we need to look at the skills needed to change organisational culture, the identity of the Information Security Manager and effective communication between Information Security Managers, end users and Senior Managers. © 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:195 / 201
页数:6
相关论文
共 5 条
[1]  
Adams A., Sasse M.A., Users are not the enemy, Communications of the ACM, 42, pp. 40-46, (1999)
[2]  
Dhillon G., Backhouse J., Current directions in IS security research: towards socio-technical perspectives, Information Systems Journal, (2001)
[3]  
Johnson G., Scholes K., Exploring corporate strategy, (2002)
[4]  
McFadzean E., Ezineard J.-N., Birchall D., Perception of risk and the strategic impact of existing IT on Information Security strategy at board level, Online Information Review, Emerald, 31, 5, pp. 622-660, (2007)
[5]  
Purser S., A practical guide to managing Information Security, (2004)