State of the art in information security policy development

被引:40
作者
Paananen, Hanna [1 ]
Lapke, Michael [2 ]
Siponen, Mikko [1 ]
机构
[1] Univ Jyvaskyla, Post Box 35, Jyvaskyla 40014, Finland
[2] Univ Mary Washington, 1301 Coll Ave, Fredericksburg, VA 22401 USA
关键词
Information security policy; Literature review; Policy development; Development method; Concept definition; ACCESS-CONTROL; FRAMEWORK; MODEL; MANAGEMENT; TECHNOLOGY; DESIGN;
D O I
10.1016/j.cose.2019.101608
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the prevalence of research that exists under the label of "information security policies" (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an outcome, we raise issues in ISP definitions and development methods that should be addressed in future research and practical applications. This review concludes that for state-of-the-art ISP development, the focus should shift more toward organization-specific information security needs, as the direction of the current research is still lacking contributions that would show how contextual factors could be successfully integrated into ISP development. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 90 条
[71]   ACCESS-CONTROL - PRINCIPLES AND PRACTICE [J].
SANDHU, RS ;
SAMARATI, P .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :40-48
[72]  
Shirtz Dov, 2011, Information Management & Computer Security, V19, P95, DOI 10.1108/09685221111143042
[73]   Information security: Critical review and future directions for research [J].
Silic, Mario ;
Back, Andrea .
Information Management and Computer Security, 2014, 22 (03) :279-308
[74]   Impact of information security initiatives on supply chain performance an empirical investigation [J].
Sindhuja, P.N. .
Information Management and Computer Security, 2014, 22 (05) :450-473
[75]  
Siponen M. T., 2000, Information Management & Computer Security, V8, P31, DOI 10.1108/09685220010371394
[76]  
Siponen M T., 2007, The Database for Advances in Information Systems, V38
[77]   Six design theories for IS security policies and guidelines [J].
Siponen, Mikko ;
Iivari, Juhani .
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2006, 7 (07) :445-472
[78]   Information security management standards: Problems and solutions [J].
Siponen, Mikko ;
Willison, Robert .
INFORMATION & MANAGEMENT, 2009, 46 (05) :267-270
[79]   An analysis of the traditional IS security approaches: implications for research and practice [J].
Siponen, MT .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2005, 14 (03) :303-315
[80]   The information systems' security level assessment model based on an ontology and evidential reasoning approach [J].
Solic, Kresimir ;
Ocevcic, Hrvoje ;
Golub, Marin .
COMPUTERS & SECURITY, 2015, 55 :100-112