A Conceptual Analysis about the Organizational Impact of Compliance on Information Security Policy

被引:0
作者
Cavallari, Maurizio [1 ]
机构
[1] Catholic Univ, Dept Business Adm SE Gest A, Milan, Italy
来源
EXPLORING SERVICES SCIENCE | 2012年 / 103卷
关键词
Compliance; information security policy; ISP; information systems security; ISS; COMPETITIVE ADVANTAGE; SYSTEMS SECURITY; AWARENESS; MODEL; TECHNOLOGY; DETERRENCE; ADHERENCE; ECONOMICS; DESIGN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protection of data and information security are crucial to business processes and include technical, sociological and organizational aspects. The purpose of this paper is to explore the importance of information security policy and organizational compliance within a socio-technical framework. Citing come of the major compliance acts in the United States, this paper examines how the need arose for information security compliance and the antecedents that made compliance mandatory for organizations. This would apply to any organization, in whichever other country. within its legal compliance framework. A discussion follows to help shed light on how both individual employees and the organization as a whole often fail to implement a satisfactory compliance initiative. Finally, the research presents a set of key factors that influence successful implementation of information system security Compliance into the information security policy (ISP), along with what actions should be taken to make compliance a competitive advantage for the organization. taking advantage of the particular relationship between compliance and ISP.
引用
收藏
页码:101 / 114
页数:14
相关论文
共 89 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]  
Ajzen I., 1980, Understanding attitudes and predicting social behavior
[3]  
Ajzen I., 2007, Prediction and Change of Health Behaviors, P3, DOI DOI 10.4324/9780203937082
[4]  
Alter A., 2006, COMPLIANCE SPENDING
[5]  
Alter A., 2006, DATA SECURITY RECEIV
[6]  
Alter A., 2006, CIOS FIND COMPLIANCE
[7]  
Alter A., 2006, COMPLIANCE REMAINS P
[8]   Economics of information security [J].
Anderson, R ;
Schneier, B .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :12-13
[9]  
Anderson R, 2008, LECT NOTES COMPUT SC, V5094, P64
[10]  
Anderson R, 2008, LECT NOTES ARTIF INT, V5076, P49, DOI 10.1007/978-3-540-70525-3_5