Socio-technical systems cybersecurity framework

被引:34
作者
Malatji, Masike [1 ]
Von Solms, Sune [2 ]
Marnewick, Annlize [1 ]
机构
[1] Univ Johannesburg, Postgrad Sch Engn Management, Johannesburg, South Africa
[2] Univ Johannesburg, Dept Elect Engn Sci, Johannesburg, South Africa
关键词
Information security; Security; Modelling; SECURITY; INTERNET; MODEL; MATURITY; PRIVACY; THREAT; SAFETY; THINGS;
D O I
10.1108/ICS-03-2018-0031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose This paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices. This culminates in the equal emphasis of both the social, technical and environmental factors affecting security practices. Design/methodology/approach The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied to specifically analyse some selected information and cybersecurity frameworks. The outcome of this exercise culminated in the design of a socio-technical systems cybersecurity framework that can be applied to any new or existing information and cybersecurity solutions in the organisation. A framework parameter to help continuously monitor the mutual alignment of the social, technical and environmental dimensions of the socio-technical systems cybersecurity framework was also introduced. Findings The results indicate a positive application of the socio-technical systems theory to the information and cybersecurity domain. In particular, the application of the conceptual process model is able to successfully categorise the selected information and cybersecurity practices into either social, technical or environmental practices. However, the validation of the socio-technical systems cybersecurity framework requires time and continuous monitoring in a real-life environment. Practical implications - This research is beneficial to chief security officers, risk managers, information technology managers, security professionals and academics. They will gain more knowledge and understanding about the need to highlight the equal importance of both the social, technical and environmental dimensions of information and cybersecurity. Further, the less emphasised dimension is posited to open an equal but mutual security vulnerability gap as the more emphasised dimension. Both dimensions must, therefore, equally and jointly be emphasised for optimal security performance in the organisation. Originality/value The application of socio-technical systems theory to the information and cybersecurity domain has not received much attention. In this regard, the research adds value to the information and cybersecurity studies where too much emphasis is placed on security software and hardware capabilities.
引用
收藏
页码:233 / 272
页数:40
相关论文
共 74 条
  • [1] Al Sabbagh B., 2012, 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), DOI 10.1109/CyberSec.2012.6246110
  • [2] Al-Daraiseh AA, 2014, INT J ADV COMPUT SC, V5, P129
  • [3] A cyclical evaluation model of information security maturity
    Rigon, Evandro Alencar
    Westphall, Carla Merkle
    Dos Santos, Daniel Ricardo
    Westphall, Carlos Becker
    [J]. Dos Santos, Daniel Ricardo (danielrs@inf.ufsc.br), 1600, Emerald Group Holdings Ltd. (22): : 265 - 278
  • [4] Applebaum S. H., 1997, Manage Decis, V35, P452, DOI 10.1108/00251749710173823
  • [5] Socio-technical systems: From design methods to systems engineering
    Baxter, Gordon
    Sommerville, Ian
    [J]. INTERACTING WITH COMPUTERS, 2011, 23 (01) : 4 - 17
  • [6] ASSESSING THE EFFECTIVENESS OF SOCIOTECHNICAL INTERVENTIONS - ANTIDOTE OR FAD
    BEEKUN, RI
    [J]. HUMAN RELATIONS, 1989, 42 (10) : 877 - 897
  • [7] Service security and privacy as a socio-technical problem
    Bella, Giampaolo
    Curzon, Paul
    Lenzini, Gabriele
    [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (05) : 563 - 585
  • [8] Borrett M., 2013, Using the IBM security framework and IBM security blueprint to realize business-driven security, 3rd Edition, V3rd
  • [9] Bostrom R. P., 1977, MIS Quarterly, P17, DOI [DOI 10.2307/248710, DOI 10.2307/249019]
  • [10] Budzak D., 2016, Business Information Review, V33, P85, DOI DOI 10.1177/0266382116650792