The regulatory challenges of Australian information security practice

被引:5
作者
Burdon, Mark [1 ]
Siganto, Jodie [2 ]
Coles-Kemp, Lizzie [2 ]
机构
[1] Univ Queensland, TC Beirne Sch Law, Forgan Smith Bldg,St Lucia Campus, Brisbane, Qld 4072, Australia
[2] Royal Holloway Univ London, Egham, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Information security; Data protection; Data breaches; Information security management;
D O I
10.1016/j.clsr.2016.05.004
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Information security is not directly regulated in Australia and is instead subject to a patchwork of different legal and regulatory frameworks. How Australian information security practitioners construct and action information security therefore becomes important to the overall operation of a fragmented regulatory framework. How then do Australian information security practitioners understand information security and make compliance oriented decisions? Our exploratory interview research examined how nine Australian information security practitioners understood and constructed their role as delegated regulators of organisational information security processes. Participants expressed a number of concerns that reveal a very different world to that traditionally portrayed as the discipline and practice of information security. We examine these concerns and discuss what they mean in the context of the Australian environment. (C) 2016 Mark Burdon, Jodie Siganto & Lizzie Coles-Kemp. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:623 / 633
页数:11
相关论文
共 40 条
  • [1] A qualitative study of users' view on information security
    Albrechtsen, Eirik
    [J]. COMPUTERS & SECURITY, 2007, 26 (04) : 276 - 289
  • [2] Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
    Albrechtsen, Eirik
    Hoyden, Jan
    [J]. COMPUTERS & SECURITY, 2010, 29 (04) : 432 - 445
  • [3] The information security digital divide between information security managers and users
    Albrechtsen, Eirik
    Hovden, Jan
    [J]. COMPUTERS & SECURITY, 2009, 28 (06) : 476 - 490
  • [4] [Anonymous], 1980, GUID PROT PRIV TRANS
  • [5] [Anonymous], 2013, ISO/IEC 27002:2013
  • [6] [Anonymous], 2013, BS: 27001: 2013
  • [7] Information Security management: A human challenge?
    Department of Informatics and Sensors, Cranfield University, Swindon, SN6 8LA, United Kingdom
    [J]. Inf Secur Tech Rep, 2008, 4 (195-201): : 195 - 201
  • [8] CISOs and organisational culture: Their own worst enemy?
    Ashenden, Debi
    Sasse, Angela
    [J]. COMPUTERS & SECURITY, 2013, 39 : 396 - 405
  • [9] Attorney-General's Department, 2010, GOV RESP HOUS REPR S
  • [10] Australian Government, 2014, AUSTR GOV GUID REG, P28