Information security culture: A management perspective

被引:141
作者
Van Niekerk, J. F. [1 ]
Von Solms, R. [1 ]
机构
[1] Nelson Mandela Metropolitan Univ, Inst Informat & Commun Technol Advancement, Sch ICT, Dept Informat Syst, ZA-6031 Port Elizabeth, South Africa
关键词
Information security; Information security culture; Corporate culture; Organizational learning; Schein's model;
D O I
10.1016/j.cose.2009.10.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information technology has become an integral part of modern life. Today, the use of information permeates every aspect of both business and private lives. Most organizations need information systems to survive and prosper and thus need to be serious about protecting their information assets. Many of the processes needed to protect these information assets are, to a large extent, dependent on human cooperated behavior. Employees, whether intentionally or through negligence, often due to a lack of knowledge, are the greatest threat to information security. It has become widely accepted that the establishment of an organizational sub-culture of information security is key to managing the human factors involved in information security. This paper briefly examines the generic concept of corporate culture and then borrows from the management and economical sciences to present a conceptual model of information security culture. The presented model incorporates the concept of elasticity from the economical sciences in order to show how various variables in an information security culture influence each other. The purpose of the presented model is to facilitate conceptual thinking and argumentation about information security culture. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:476 / 486
页数:11
相关论文
共 15 条
[1]  
ACS ZJ, 1996, MANEGERIAL EC ORG
[2]  
Carr NG, 2003, HARVARD BUS REV, V81, P41
[3]  
Creswell J. W., 2018, Qualitative inquiry research design: Choosing among five approaches, DOI DOI 10.1177/1524839915580941
[4]   Information security management: An approach to combine process certification and product evaluation [J].
Eloff, MM ;
von Solms, SH .
COMPUTERS & SECURITY, 2000, 19 (08) :698-709
[5]  
*INT STAND ORG, 2005, 27002 ISOIEC
[6]  
Mitnick K.D., 2003, The Art of Deception: controlling the Human Element of Security
[7]  
Schein E. H., 1999, The Corporate Culture Survival Guide: Sense and Nonsense about Cultural Change
[8]  
Schlienger T., 2003, INFORM SECURITY CULT
[9]  
Siponen M. T., 2001, Computers & Society, V31, P24, DOI 10.1145/503345.503348
[10]  
Smit P.J., 1992, MANAGEMENT PRINCIPLE, V2nd