State of the art in information security policy development

被引:40
作者
Paananen, Hanna [1 ]
Lapke, Michael [2 ]
Siponen, Mikko [1 ]
机构
[1] Univ Jyvaskyla, Post Box 35, Jyvaskyla 40014, Finland
[2] Univ Mary Washington, 1301 Coll Ave, Fredericksburg, VA 22401 USA
关键词
Information security policy; Literature review; Policy development; Development method; Concept definition; ACCESS-CONTROL; FRAMEWORK; MODEL; MANAGEMENT; TECHNOLOGY; DESIGN;
D O I
10.1016/j.cose.2019.101608
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the prevalence of research that exists under the label of "information security policies" (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an outcome, we raise issues in ISP definitions and development methods that should be addressed in future research and practical applications. This review concludes that for state-of-the-art ISP development, the focus should shift more toward organization-specific information security needs, as the direction of the current research is still lacking contributions that would show how contextual factors could be successfully integrated into ISP development. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 90 条
[61]   What levels of moral reasoning and values explain adherence to information security rules? An empirical study [J].
Myyry, Liisa ;
Siponen, Mikko ;
Pahnila, Seppo ;
Vartiainen, Tero ;
Vance, Anthony .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :126-139
[62]   Abductive innovations in information security policy development: an ethnographic study [J].
Niemimaa, Marko ;
Niemimaa, Elina .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2019, 28 (05) :566-589
[63]   DEVELOPMENT OF SECURITY POLICIES [J].
OLNES, J .
COMPUTERS & SECURITY, 1994, 13 (08) :628-636
[64]   Identifying linkages between statements in information security policy, procedures and controls [J].
Pathari, Vinod ;
Sonar, Rajendra .
Information Management and Computer Security, 2012, 20 (04) :264-280
[65]  
PORTER ME, 1979, HARVARD BUS REV, V57, P137
[66]   A framework for the governance of information security [J].
Posthumus, S ;
von Solms, R .
COMPUTERS & SECURITY, 2004, 23 (08) :638-646
[67]   PFIRES: A policy framework for information security [J].
Rees, J ;
Bandyopadhyay, S ;
Spafford, EH .
COMMUNICATIONS OF THE ACM, 2003, 46 (07) :101-106
[68]   Ethical decision making: Improving the quality of acceptable use policies [J].
Ruighaver, A. B. ;
Maynard, S. B. ;
Warren, M. .
COMPUTERS & SECURITY, 2010, 29 (07) :731-736
[69]   An information security knowledge sharing model in organizations [J].
Safa, Nader Sohrabi ;
Von Solms, Rossouw .
COMPUTERS IN HUMAN BEHAVIOR, 2016, 57 :442-451
[70]  
Saleh M.F., 2011, International Journal of Computer Science and Security, V5, P316