Materializing Organizational Information Security

被引:0
|
作者
Harnesk, Dan [1 ]
Lindstrom, John
机构
[1] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
来源
NORDIC CONTRIBUTIONS IN IS RESEARCH | 2012年 / 124卷
关键词
MANAGEMENT; TECHNOLOGY; CHALLENGES; DECISION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of situated elderly care this paper discusses the intertwined relationship between organizational security objectives, technology, and employees' security behavior. We use findings from a single case study to aid in our understanding of how managers sought to create a secure work environment by introducing behavioral security technology, and how employees appreciated the new security software in everyday routines. Theoretically the case study is informed by sociomateriality in that it employs the notion of technological affordances of behavioral security technology. Findings show that security technology material is an integral part of security management and security in use, and that both the technical actor and human actors contributed to cultivation of the information security practice in the elderly care center.
引用
收藏
页码:76 / 94
页数:19
相关论文
共 50 条
  • [41] Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments
    Heidt, Margareta
    Gerlach, Jin P.
    Buxmann, Peter
    INFORMATION SYSTEMS FRONTIERS, 2019, 21 (06) : 1285 - 1305
  • [42] Information security as a national security component
    Alguliyev, Rasim M.
    Imamverdiyev, Yadigar N.
    Mahmudov, Rasim Sh.
    Aliguliyev, Ramiz M.
    INFORMATION SECURITY JOURNAL, 2021, 30 (01): : 1 - 18
  • [43] Governing the fiduciary relationship in information security services
    Wu, Yu Andy
    Saunders, Carol S.
    DECISION SUPPORT SYSTEMS, 2016, 92 : 57 - 67
  • [44] State of the art in information security policy development
    Paananen, Hanna
    Lapke, Michael
    Siponen, Mikko
    COMPUTERS & SECURITY, 2020, 88
  • [45] Assessing information security risks in the cloud: A case study of Australian local government authorities
    Ali, Omar
    Shrestha, Anup
    Chatfield, Akemi
    Murray, Peter
    GOVERNMENT INFORMATION QUARTERLY, 2020, 37 (01)
  • [46] A survey of information security incident handling in the cloud
    Ab Rahman, Nurul Hidayah
    Choo, Kim-Kwang Raymond
    COMPUTERS & SECURITY, 2015, 49 : 45 - 69
  • [47] Information Security in eLearning: A Discussion of Empirical Data on Information Security and eLearning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON E-LEARNING, 2010, : 282 - 290
  • [48] Organizational Context Components in Information Systems Research A Literature Review
    Xu, Jin
    Liao, Stephen S. Y.
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5071 - +
  • [49] THE INTENSITY OF HUMAN RESOURCES INFORMATION SYSTEMS USAGE AND ORGANIZATIONAL PERFORMANCE
    Barisic, Anton Florijan
    Poor, Jozsef
    Bach, Mirjana Pejic
    INTERDISCIPLINARY DESCRIPTION OF COMPLEX SYSTEMS, 2019, 17 (03) : 586 - 597
  • [50] Relationship between Knowledge Sharing Security and Organizational Context in the Public and Private Organizations
    Sarkheyli, Azadeh
    AMCIS 2016 PROCEEDINGS, 2016,