Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective

被引:0
作者
Susan P. Williams
Catherine A. Hardy
Janine A. Holgate
机构
[1] University of Koblenz-Landau,Institute for Information Systems Research
[2] University of Sydney,Discipline of Business Information Systems
[3] Wipro Technologies,Wipro Consulting Services
来源
Electronic Markets | 2013年 / 23卷
关键词
Information security governance; Information protection; Critical infrastructure; Interpretive case study; Institutional logics; Socio-technical systems; M15;
D O I
暂无
中图分类号
学科分类号
摘要
Achieving a sustainable information protection capability within complex business, legal and technical environments is an integral part of supporting an organization’s strategic and compliance objectives. Despite a growing focus on information security governance (ISG) it remains under-explored requiring greater empirical scrutiny and more contextually attuned theorizing. This study adopts an interpretive case approach and uses analytical lenses drawing from socio-technical systems and institutional logics to examine how ISG arrangements are framed and shaped in practice in fourteen Australian Critical Infrastructure Organizations. Our findings illustrate the heterogeneity and malleability of ISG across different organizations involving intra- and inter-organizational relationships and trust mechanisms. We identify the need to reframe ISG, adopting the new label information protection governance (IPG), to present a more multi-faceted view of information protection incorporating a richly layered set of social and technical aspects, that constitute and are constituted by governance arrangements.
引用
收藏
页码:341 / 354
页数:13
相关论文
共 63 条
[1]  
Cavaye ALM(1996)Case study research: a multi-faceted research approach for IS Information Systems Journal 6 227-242
[2]  
Coles RS(2003)Operationalizing IT risk management Computers & Security 22 487-493
[3]  
Moulton R(2007)An information security governance framework Information Systems Management 24 361-372
[4]  
Da Veiga A(2006)Value-focused assessment of information system security in organizations Information Systems Journal 16 293-314
[5]  
Eloff JHP(2002)Management’s role in information security in a cyber economy California Management Review 45 67-87
[6]  
Dhillon G(1989)Building theories from case study research Academy of Management Review 14 532-550
[7]  
Torkzadeh G(2003)The management of information security - A South African case study South African Journal of Business Management 34 19-29
[8]  
Dutta A(2003)The application of information security policies in large UK-based organizations: an exploratory investigation Information Management & Computer Security 11 106-114
[9]  
McCrohan K(2005)Management of risk in the information age Computers & Security 24 16-30
[10]  
Eisenhardt KM(1985)Economic action and social structure: the problem of embeddedness American Journal of Sociology 91 481-510