The significance of securing as a critical component of information security: An Australian narrative

被引:9
作者
Burdon, Mark [1 ]
Coles-Kemp, Lizzie [2 ]
机构
[1] Queensland Univ Technol, Fac Law, Room C711,C Block,Gardens Point Campus, Brisbane, Qld 4000, Australia
[2] Royal Holloway Univ London, Dept Informat Secur, Egham TW20 0EX, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Security studies; Usable security; Information security messaging; Human aspects; Organisational culture; Ontological security; Information security management; BIG DATA; INSECURITY; PARTICIPATION; AWARENESS; IDENTITY; STATE;
D O I
10.1016/j.cose.2019.101601
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As information security is called upon to operate in increasingly unstable spaces, the role of the information security practitioner becomes ever more complex. Successful information security practice depends on tactics and strategies that situate the need for protection within organisational goals. These tactics and strategies have become progressively important as organisations are disrupted by digital technology. The locus of control is unpredictably distributed across groups within an organisation. Finding consensus about the need for security thus becomes challenging. Information security controls are an important part of the control structure but increasingly they are negotiated controls, making the process of securing as important as the security mechanisms themselves. We employ broader political and social theories of security, most notably Smith (2005), to analyse data from nine semi-structured interviews of Australian information security practitioners. Our findings delineate the interlinking concepts of securing and security. Security is straightforward. It is a state of being secure. Securing, on the other hand, is complex. It is a consensus-seeking, value-engagement process that enables the attainment of security. Through this analysis, we identify processes and techniques of securing tacitly employed by the participants. Central to effective securing practice is a participant's ability to, 'get the security message right.' The message is used to create an agreed value consensus across conflict-ridden environments. We contend that securing is often undervalued and not recognised as a distinct theoretical part of the discipline of information security. However, given the complexity and uncertainty of information security practice, we argue that securing needs to be considered as a critical component of being secure. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 51 条
[11]   Can We Sell Security Like Soap? A New Approach to Behaviour Change [J].
Ashenden, Debi ;
Lawrence, Darren .
PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13), 2013, :87-94
[12]   CISOs and organisational culture: Their own worst enemy? [J].
Ashenden, Debi ;
Sasse, Angela .
COMPUTERS & SECURITY, 2013, 39 :396-405
[13]  
Banks Marcus., 2007, USING VISUAL DATA QU
[14]  
Baskerville R., 1991, Computers & Security, V10, P749, DOI 10.1016/0167-4048(91)90094-T
[15]  
Baskerville R., 1991, European Journal of Information Systems, V1, P121, DOI 10.1057/ejis.1991.20
[16]   Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks [J].
Bauer, Stefan ;
Bernroider, Edward W. N. ;
Chudzikowski, Katharina .
COMPUTERS & SECURITY, 2017, 68 :145-159
[17]  
Bekkevik F.M., 2018, DIGITAL SOCIAL TRANS
[18]   Digitisation, 'Big Data' and the transformation of accounting information [J].
Bhimani, Alnoor ;
Willcocks, Leslie .
ACCOUNTING AND BUSINESS RESEARCH, 2014, 44 (04) :469-490
[19]   Securing the human in critical security studies: the insecurity of a secure ethics [J].
Bourne, Mike ;
Bulley, Dan .
EUROPEAN SECURITY, 2011, 20 (03) :453-471
[20]   The regulatory challenges of Australian information security practice [J].
Burdon, Mark ;
Siganto, Jodie ;
Coles-Kemp, Lizzie .
COMPUTER LAW & SECURITY REVIEW, 2016, 32 (04) :623-633