State of the art in information security policy development

被引:40
作者
Paananen, Hanna [1 ]
Lapke, Michael [2 ]
Siponen, Mikko [1 ]
机构
[1] Univ Jyvaskyla, Post Box 35, Jyvaskyla 40014, Finland
[2] Univ Mary Washington, 1301 Coll Ave, Fredericksburg, VA 22401 USA
关键词
Information security policy; Literature review; Policy development; Development method; Concept definition; ACCESS-CONTROL; FRAMEWORK; MODEL; MANAGEMENT; TECHNOLOGY; DESIGN;
D O I
10.1016/j.cose.2019.101608
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the prevalence of research that exists under the label of "information security policies" (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an outcome, we raise issues in ISP definitions and development methods that should be addressed in future research and practical applications. This review concludes that for state-of-the-art ISP development, the focus should shift more toward organization-specific information security needs, as the direction of the current research is still lacking contributions that would show how contextual factors could be successfully integrated into ISP development. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 90 条
[1]  
Abrams Marshall., 1995, Information Security: An Integrated Collection of Essays, P126
[2]   Information security governance in Saudi organizations: An empirical study [J].
Abu-Musa A. .
Information Management and Computer Security, 2010, 18 (04) :226-276
[3]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[4]   A security policy model for clinical information systems [J].
Anderson, RJ .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :30-43
[5]  
[Anonymous], IADIS INT C INF SYST
[6]  
[Anonymous], INF MANAGE COMPUT SE
[7]  
[Anonymous], INFORM MANAGEMENT CO
[8]  
[Anonymous], 2011, 9th Australian Information Security Management Conference, DOI [DOI 10.4225/75/57B546FECD8C6, 10.4225/75/57B546FECD8C6]
[9]  
[Anonymous], 1 WORKSH SEC PRIV E
[10]  
[Anonymous], COB 5