The information security digital divide between information security managers and users

被引:79
作者
Albrechtsen, Eirik [1 ,2 ]
Hovden, Jan
机构
[1] Norwegian Univ Sci & Technol, Dept Ind Econ & Technol Management, SINTEF Teknol & Samfunn, N-7491 Trondheim, Norway
[2] SINTEF Technol & Soc, Dept Safety Res, N-7465 Trondheim, Norway
关键词
Information security; Digital divide; Information security managers; Users; Qualitative research; Risk perception; RISK PERCEPTION;
D O I
10.1016/j.cose.2009.01.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Empirical findings from surveys and in-depth interviews with information security managers and users indicate that a digital divide exists between these groups in terms of their views on and experience of information security practices. Information security professionals mainly regard users as an information security threat, whereas users believe themselves that they are an untapped resource for security work. The limited interaction between users and information security managers results in a lack of understanding for the other's point of view. These divergent views on and interpretations of information security mean that managers tend to base their practical method on unrealistic assumptions, resulting in management approaches that are poorly aligned with the dynamics of the users' working day. (C 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:476 / 490
页数:15
相关论文
共 50 条
[1]   Bridging the gap between organizational and user perspectives of security in the clinical domain [J].
Adams, A ;
Blandford, A .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) :175-202
[2]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[3]  
ALBRECHTSEN E, 2004, FLIS FINGEREN RAGNAR, P319
[4]  
ALBRECHTSEN E, 2008, THESIS NORWEGIAN U S, P101
[5]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[6]   BEHAVIORAL ECONOMICS AND COMPLIANCE WITH SAFETY REGULATIONS [J].
BATTMANN, W ;
KLUMB, P .
SAFETY SCIENCE, 1993, 16 (01) :35-46
[7]   Computer security impaired by legitimate users [J].
Besnard, D ;
Arief, B .
COMPUTERS & SECURITY, 2004, 23 (03) :253-264
[8]  
Clegg S.R., 1989, FRAMEWORKS POWER
[9]  
Dahl R., 1963, Modern political analysis
[10]   Current directions in IS security research: towards socio-organizational perspectives [J].
Dhillon, G ;
Backhouse, J .
INFORMATION SYSTEMS JOURNAL, 2001, 11 (02) :127-153