Ethical decision making: Improving the quality of acceptable use policies

被引:10
作者
Ruighaver, A. B. [2 ]
Maynard, S. B. [1 ]
Warren, M. [2 ]
机构
[1] Univ Melbourne, Dept Informat Syst, Melbourne, Vic 3010, Australia
[2] Deakin Univ, Sch Informat Syst, Melbourne, Vic, Australia
关键词
Acceptable use policies; Consequential ethics; Ethical decision making; Security policy quality; Security management;
D O I
10.1016/j.cose.2010.05.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While there is extensive literature on the positive effects of institutionalising ethics in organisational culture, our extensive research in information security culture has found no evidence of organisations encouraging ethical decision making in situations where in formation security might be at risk. Security policies, in particular acceptable use policies, have traditionally been written with a strategy of deterrence in mind, but in practice they rely mostly on deontological ethics, i.e. employees doing the right thing, to work. As far back as 1990, evidence has been reported of a widening socio-technical gap, where employees no longer always act according to expected social norms in an organisation. This change in moral behaviour is reducing the effectiveness of acceptable use policies in an organisation. In this paper, an alternative approach to the development of security policies is proposed to encourage ethical decision making based on consequential ethics. Acceptable use policies will need to distinguish between guidelines, standards and procedures, and guidelines will need to be written in such a way that the policy continuously acknowledges that employees are no longer expected to blindly follow these guidelines. And, as acceptable use policies can no longer cover all the possible risks related to an employee's behaviour, the policy will need to emphasise both explicitly an implicitly that employees are expected to make an ethical judgement on all their actions that may possibly endanger the organisation's security. This will in turn have positive effects on the usability and suitability of the acceptable use policy to the organisation. Crown Copyright (C) 2010 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:731 / 736
页数:6
相关论文
共 20 条
[1]  
[Anonymous], IFIP TC11 INT C INF
[2]  
Chia P.A., 2003, Information systems: The challenges of theory and practice, P335
[3]  
HARTMANN A, 1995, IFIP TC11 11 INT C I
[4]  
Hone K.e., 2002, Network Security, V6, P14, DOI DOI 10.1016/J.DSS.2009.02.005
[5]  
KABAY ME, 1993, P 16 NAT COMP SEC C
[6]  
KOWALSKI S, 1990, IFIP TC11 6 INT C IN
[7]  
Leiwo J, 1998, P ANN HICSS, P213, DOI 10.1109/HICSS.1998.654776
[8]  
Lichtenstein S, 1997, P ANN HICSS, P350, DOI 10.1109/HICSS.1997.663407
[9]  
MAYNARD S, 2003, INFORM SYSTEMS CHALL, P366
[10]  
Maynard S. B., 2006, 5 ANN SEC C LAS VEG