The significance of securing as a critical component of information security: An Australian narrative

被引:9
作者
Burdon, Mark [1 ]
Coles-Kemp, Lizzie [2 ]
机构
[1] Queensland Univ Technol, Fac Law, Room C711,C Block,Gardens Point Campus, Brisbane, Qld 4000, Australia
[2] Royal Holloway Univ London, Dept Informat Secur, Egham TW20 0EX, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Security studies; Usable security; Information security messaging; Human aspects; Organisational culture; Ontological security; Information security management; BIG DATA; INSECURITY; PARTICIPATION; AWARENESS; IDENTITY; STATE;
D O I
10.1016/j.cose.2019.101601
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As information security is called upon to operate in increasingly unstable spaces, the role of the information security practitioner becomes ever more complex. Successful information security practice depends on tactics and strategies that situate the need for protection within organisational goals. These tactics and strategies have become progressively important as organisations are disrupted by digital technology. The locus of control is unpredictably distributed across groups within an organisation. Finding consensus about the need for security thus becomes challenging. Information security controls are an important part of the control structure but increasingly they are negotiated controls, making the process of securing as important as the security mechanisms themselves. We employ broader political and social theories of security, most notably Smith (2005), to analyse data from nine semi-structured interviews of Australian information security practitioners. Our findings delineate the interlinking concepts of securing and security. Security is straightforward. It is a state of being secure. Securing, on the other hand, is complex. It is a consensus-seeking, value-engagement process that enables the attainment of security. Through this analysis, we identify processes and techniques of securing tacitly employed by the participants. Central to effective securing practice is a participant's ability to, 'get the security message right.' The message is used to create an agreed value consensus across conflict-ridden environments. We contend that securing is often undervalued and not recognised as a distinct theoretical part of the discipline of information security. However, given the complexity and uncertainty of information security practice, we argue that securing needs to be considered as a critical component of being secure. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 51 条
[1]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[2]   Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study [J].
Albrechtsen, Eirik ;
Hoyden, Jan .
COMPUTERS & SECURITY, 2010, 29 (04) :432-445
[3]   The information security digital divide between information security managers and users [J].
Albrechtsen, Eirik ;
Hovden, Jan .
COMPUTERS & SECURITY, 2009, 28 (06) :476-490
[4]  
[Anonymous], 2005, Br. J. Polit. Int. Relat.
[5]  
[Anonymous], WHAT USABLE SECURITY
[6]  
[Anonymous], YOU SHAP SEC
[7]  
[Anonymous], DIVIDE CONQUER ROLE
[8]   Information Security management: A human challenge? [J].
Department of Informatics and Sensors, Cranfield University, Swindon, SN6 8LA, United Kingdom .
Inf Secur Tech Rep, 2008, 4 (195-201) :195-201
[9]   In their own words: employee attitudes towards information security [J].
Ashenden, Debi .
INFORMATION AND COMPUTER SECURITY, 2018, 26 (03) :327-337
[10]   Security Dialogues: Building Better Relationships between Security and Business [J].
Ashenden, Debi ;
Lawrence, Darren .
IEEE SECURITY & PRIVACY, 2016, 14 (03) :82-87