Abductive innovations in information security policy development: an ethnographic study

被引:16
作者
Niemimaa, Marko [1 ]
Niemimaa, Elina [1 ]
机构
[1] Univ Jyvaskyla, Fac Informat Technol, Jyvaskyla, Finland
关键词
Michael Myers; Anat Hovav; Information security policy development; ISS policy; ethnography; abductive innovation; SYSTEMS RESEARCH; MANAGEMENT; WORK; STANDARDS; DESIGN; TECHNOLOGY; MODEL; RISK; GOVERNANCE; DIALECTICS;
D O I
10.1080/0960085X.2019.1624141
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Developing organisational information security (InfoSec) policies that account for international best practices but are contextual is as much an opportunity for improving InfoSec as it is a challenge. Previous research indicates that organisations should create InfoSec policies based on best practices (top-down) and simultaneously encourages participatory development (bottom-up). These contradictory suggestions place managers in a dilemma: Should they follow a top-down or bottom-up approach? In this research, we build on an ethnographic approach to study how an innovative engineering company (MachineryCorp) managed the contradiction when the firm developed an InfoSec policy. Drawing on the dialectical theory of organisations as a lens, the findings suggest the InfoSec policy development is a recurrent process consisting of three phases: (1) drawing interpretations of InfoSec requirements from best practices (deductive adoption) and (2) constructing possibilities for local implementation (inductive adjustment) (3) that engender tensions between best practices and local contingencies facilitating innovative local resolutions (synthetic innovation). We call this process abductive innovation. At MachineryCorp, a triangle of tensions surfaced due to economic realities, infrastructure affordances, and social arrangements, and were necessary in explaining how the InfoSec policy gradually and iteratively materialised and resulted in an organisationally contingent policy.
引用
收藏
页码:566 / 589
页数:24
相关论文
共 134 条
[1]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[2]   MAKING WORK INVISIBLE: NEW PUBLIC MANAGEMENT AND OPERATIONAL WORK IN CRITICAL INFRASTRUCTURE SECTORS [J].
Almklov, Petter Grytten ;
Antonsen, Stian .
PUBLIC ADMINISTRATION, 2014, 92 (02) :477-492
[3]  
Alvesson M., 2011, ACAD MANAGE REV, V36, P247
[4]  
[Anonymous], P EUR C INF SYST BAR
[5]  
[Anonymous], P PAC AS C INF JEJ I
[6]  
[Anonymous], AV TEST SEC REP 2016
[7]  
[Anonymous], 2015, 2015 INF SEC BREACH
[8]  
[Anonymous], 27001 ISOIEC
[9]  
[Anonymous], CYB REG PREP FAC CYB
[10]  
[Anonymous], 1985, NATURALISTIC INQUIRY, DOI DOI 10.1002/EV.1427