Information security: Listening to the perspective of organisational insiders

被引:30
作者
Choi, SeEun [1 ]
Martins, Jorge Tiago [1 ]
Bernik, Igor [2 ]
机构
[1] Univ Sheffield, Informat Sch, Sheffield, S Yorkshire, England
[2] Univ Maribor, Fac Criminal Justice, Informat Secur Lab, Maribor, Slovenia
关键词
Information security awareness; information security; organisational insiders; strategy as practice; STRATEGY-AS-PRACTICE; RESEARCH-AND-DEVELOPMENT; SYSTEMS SECURITY; POLICY COMPLIANCE; PROTECTION MOTIVATION; FUTURE-DIRECTIONS; PLANNED BEHAVIOR; KNOWLEDGE; IMPACT; MANAGEMENT;
D O I
10.1177/0165551517748288
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aligned with the strategy-as-practice research tradition, this article investigates how organisational insiders understand and perceive their surrounding information security practices, how they interpret them, and how they turn such interpretations into strategic actions. The study takes a qualitative case study approach, and participants are employees at the Research & Development department of a multinational original brand manufacturer. The article makes an important contribution to organisational information security management. It addresses the behaviour of organisational insiders - a group whose role in the prevention, response and mitigation of information security incidents is critical. The article identifies a set of organisational insiders' perceived components of effective information security practices (organisational mission statement; common understanding of information security; awareness of threats; knowledge of information security incidents, routines and policy; relationships between employees; circulation of stories; role of punishment provisions; and training), based on which more successful information security strategies can be developed.
引用
收藏
页码:752 / 767
页数:16
相关论文
共 109 条
[1]   Addressing dynamic issues in information security management [J].
Abbas H. ;
Magnusson C. ;
Yngstrom L. ;
Hemani A. .
Information Management and Computer Security, 2011, 19 (01) :5-24
[2]   Protecting organizational competitive advantage: A knowledge leakage perspective [J].
Ahmad, Atif ;
Bosua, Rachelle ;
Scheepers, Rens .
COMPUTERS & SECURITY, 2014, 42 :27-39
[3]   Information security strategies: towards an organizational multi-strategy perspective [J].
Ahmad, Atif ;
Maynard, Sean B. ;
Park, Sangseo .
JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) :357-370
[4]  
Al-Omari Ahmad, 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P3317, DOI 10.1109/HICSS.2012.516
[5]  
[Anonymous], 2011, INFORM SECURITY PRIN
[6]  
[Anonymous], 2009, 270002009 ISOIEC
[7]  
[Anonymous], 2013, 270022013 ISOIEC
[8]  
[Anonymous], 2007, EUR C INF SYST
[9]  
[Anonymous], MANAGEMENT LEARNING
[10]   Incident-centered information security: Managing a strategic balance between prevention and response [J].
Baskerville, Richard ;
Spagnoletti, Paolo ;
Kim, Jongwoo .
INFORMATION & MANAGEMENT, 2014, 51 (01) :138-151