Information security: Listening to the perspective of organisational insiders

被引:30
作者
Choi, SeEun [1 ]
Martins, Jorge Tiago [1 ]
Bernik, Igor [2 ]
机构
[1] Univ Sheffield, Informat Sch, Sheffield, S Yorkshire, England
[2] Univ Maribor, Fac Criminal Justice, Informat Secur Lab, Maribor, Slovenia
关键词
Information security awareness; information security; organisational insiders; strategy as practice; STRATEGY-AS-PRACTICE; RESEARCH-AND-DEVELOPMENT; SYSTEMS SECURITY; POLICY COMPLIANCE; PROTECTION MOTIVATION; FUTURE-DIRECTIONS; PLANNED BEHAVIOR; KNOWLEDGE; IMPACT; MANAGEMENT;
D O I
10.1177/0165551517748288
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aligned with the strategy-as-practice research tradition, this article investigates how organisational insiders understand and perceive their surrounding information security practices, how they interpret them, and how they turn such interpretations into strategic actions. The study takes a qualitative case study approach, and participants are employees at the Research & Development department of a multinational original brand manufacturer. The article makes an important contribution to organisational information security management. It addresses the behaviour of organisational insiders - a group whose role in the prevention, response and mitigation of information security incidents is critical. The article identifies a set of organisational insiders' perceived components of effective information security practices (organisational mission statement; common understanding of information security; awareness of threats; knowledge of information security incidents, routines and policy; relationships between employees; circulation of stories; role of punishment provisions; and training), based on which more successful information security strategies can be developed.
引用
收藏
页码:752 / 767
页数:16
相关论文
共 109 条
[31]  
Denis J.-L., 2006, Strategic Organization, V4, P349, DOI 10.1177/1476127006069427
[32]   Information system security management in the new millennium [J].
Dhillon, G ;
Backhouse, J .
COMMUNICATIONS OF THE ACM, 2000, 43 (07) :125-128
[33]   Aligning the information security policy with the strategic information systems plan [J].
Doherty, NF ;
Fulford, H .
COMPUTERS & SECURITY, 2006, 25 (01) :55-63
[34]   ORGANIZATIONAL IMAGES AND MEMBER IDENTIFICATION [J].
DUTTON, JE ;
DUKERICH, JM ;
HARQUAIL, CV .
ADMINISTRATIVE SCIENCE QUARTERLY, 1994, 39 (02) :239-263
[35]   Understanding insiders: An analysis of risk-taking behavior [J].
Farahmand, Fariborz ;
Spafford, Eugene H. .
INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) :5-15
[36]   The half-empty office: dilemmas in managing locational flexibility [J].
Fogarty, Helen ;
Scott, Peter ;
Williams, Steve .
NEW TECHNOLOGY WORK AND EMPLOYMENT, 2011, 26 (03) :183-195
[37]   Managing R&D in technology-followers [J].
Forbes, N ;
Wield, D .
RESEARCH POLICY, 2000, 29 (09) :1095-1109
[38]  
Glaser B. G., 1978, [No title captured]
[39]   Evaluating information assurance strategies [J].
Hamill, JT ;
Deckro, RF ;
Kloeber, JM .
DECISION SUPPORT SYSTEMS, 2005, 39 (03) :463-484
[40]   Protection motivation and deterrence: a framework for security policy compliance in organisations [J].
Herath, Tejaswini ;
Rao, H. Raghav .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :106-125