Materializing Organizational Information Security

被引:0
|
作者
Harnesk, Dan [1 ]
Lindstrom, John
机构
[1] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
来源
NORDIC CONTRIBUTIONS IN IS RESEARCH | 2012年 / 124卷
关键词
MANAGEMENT; TECHNOLOGY; CHALLENGES; DECISION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of situated elderly care this paper discusses the intertwined relationship between organizational security objectives, technology, and employees' security behavior. We use findings from a single case study to aid in our understanding of how managers sought to create a secure work environment by introducing behavioral security technology, and how employees appreciated the new security software in everyday routines. Theoretically the case study is informed by sociomateriality in that it employs the notion of technological affordances of behavioral security technology. Findings show that security technology material is an integral part of security management and security in use, and that both the technical actor and human actors contributed to cultivation of the information security practice in the elderly care center.
引用
收藏
页码:76 / 94
页数:19
相关论文
共 50 条
  • [31] INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED BELIEFS AND INFORMATION SECURITY AWARENESS
    Bulgurcu, Burcu
    Cavusoglu, Hasan
    Benbasat, Izak
    MIS QUARTERLY, 2010, 34 (03) : 523 - 548
  • [32] Self-efficacy in information security: its influence on end users' information security practice behavior
    Rhee, Hyeun-Suk
    Kim, Cheongtag
    Ryu, Young U.
    COMPUTERS & SECURITY, 2009, 28 (08) : 816 - 826
  • [33] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [34] Inter-Organizational Information and Middleware System Projects: Success, Failure, Complexity, and Challenges
    Jrad, Radhouane B. N.
    Sundaram, David
    AMCIS 2015 PROCEEDINGS, 2015,
  • [35] Information Security Strategy: In Search of a Role
    Seeholzer, Roger V.
    AMCIS 2012 PROCEEDINGS, 2012,
  • [36] Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender
    Liu, Chenhui
    Liang, Huigang
    Wang, Nengmin
    Xue, Yajiong
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (02) : 802 - 834
  • [37] Exploring the factors in aligning information systems and organizational strategies in tall organizational structures in an uncertain environment
    Bidmeshk, Olfat Ganji
    Mehraeen, Mohammad
    Pooya, Alireza
    Maharati, Yaghoob
    ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 2022, 88 (02):
  • [38] Data Sovereignty in Inter-organizational Information Systems
    Opriel, Sebastian
    Moeller, Frederik
    Strobel, Gero
    Otto, Boris
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2024,
  • [39] IMPACTS OF COMPREHENSIVE INFORMATION SECURITY PROGRAMS ON INFORMATION SECURITY CULTURE
    Chen, Yan
    Ramamurthy, K.
    Wen, Kuang-Wei
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2015, 55 (03) : 11 - 19
  • [40] Modeling organizational and information systems for effective strategy execution
    Srivastava, Amit Kumar
    Sushil
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2015, 28 (04) : 556 - 578