Policy components - a conceptual model for modularizing and tailoring of information security policies

被引:2
|
作者
Rostami, Elham [1 ]
Karlsson, Fredrik [1 ]
Gao, Shang [1 ]
机构
[1] Orebro Univ, Dept Informat, Orebro, Sweden
关键词
Information security policy; Information security management; Policy component; Situational method engineering; Policy design; DESIGN SCIENCE;
D O I
10.1108/ICS-10-2022-0160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
PurposeThis paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs). Design/methodology/approachThis study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden. FindingsThis study's demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs. Research limitations/implicationsThe proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process. Practical implicationsPractitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs. Originality/valueThe proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.
引用
收藏
页码:331 / 352
页数:22
相关论文
共 50 条
  • [1] Policy Components - A Conceptual Model for Tailoring Information Security Policies
    Rostami, Elham
    Karlsson, Fredrik
    Gao, Shang
    HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2022, 2022, 658 : 265 - 274
  • [2] A Conceptual Analysis about the Organizational Impact of Compliance on Information Security Policy
    Cavallari, Maurizio
    EXPLORING SERVICES SCIENCE, 2012, 103 : 101 - 114
  • [3] Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
    Ransbotham, Sam
    Mitra, Sabyasachi
    INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) : 121 - 139
  • [4] A Conceptual Model Approach to Manage and Audit Information Systems Security
    Pereira, Teresa
    Santos, Henrique
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 360 - 365
  • [5] Information Security Policies in Small Finnish Companies
    Ilvonen, Ilona
    PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 112 - 117
  • [6] Requirements for computerized tools to design information security policies
    Rostami, Elham
    Karlsson, Fredrik
    Gao, Shang
    COMPUTERS & SECURITY, 2020, 99
  • [7] Aligning the information security policy with the strategic information systems plan
    Doherty, NF
    Fulford, H
    COMPUTERS & SECURITY, 2006, 25 (01) : 55 - 63
  • [8] Issues and Trends in Information Security Policy Compliance
    Bhaharin, Surayahani Hasnul
    Mokhtar, Umi Asma
    Sulaiman, Rossilawati
    Yusof, Maryati Mohd
    2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS: EMPOWERING DIGITAL INNOVATION (ICRIIS 2019), 2019,
  • [9] Information security policy: An organizational-level process model
    Knapp, Kenneth J.
    Morris, R. Franklin, Jr.
    Marshall, Thomas E.
    Byrd, Terry Anthony
    COMPUTERS & SECURITY, 2009, 28 (07) : 493 - 508
  • [10] Information security policy noncompliance: An integrative social influence model
    Gwebu, Kholekile L.
    Wang, Jing
    Hu, Michael Y.
    INFORMATION SYSTEMS JOURNAL, 2020, 30 (02) : 220 - 269