Information security strategies: towards an organizational multi-strategy perspective

نویسندگان

  • Atif Ahmad
  • Sean B. Maynard
  • Sangseo Park
چکیده

There considerable advice in both research and practice oriented literature on the topic of information security. Most of the discussion in literature focuses on how to prevent security attacks using technical countermeasures even though there are a number of other viable strategies such as deterrence, deception, detection and response. This paper reports on a qualitative study, conducted in Korea, to determine how organizations implement security strategies to protect their information systems. The findings reveal a deeply entrenched preventive mindset, driven by the desire to ensure availability of technology and services, and a comparative ignorance of exposure to business security risks. Whilst there was some evidence of usage of other strategies, they were also deployed in a preventive capacity. The paper presents a research agenda that calls for research on enterprisewide multiple strategy deployment with a focus on how to combine, balance and optimize strategies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spatial analysis of social pathology in Iran from the perspective of social geography using the Cocoso technique

Aims and Background: One of the issues that have a great contribution in achieving social comfort and welfare is security and analysis of its related components. The present study was conducted with the aim of social pathology and analyzing indicators related to social security in Iran by using the combined compromise solution, which is one of the new multi-attribute decision-making techniques....

متن کامل

Towards Understanding Deterrence: Information Security Managers' Perspective

The enforcement of information security policy is an important issue in organisations. Previous studies approach policy enforcement using deterrence theory to deal with information security violations and focus on end-users’ awareness. This study investigates deterrence strategy within organisations from the perspective of information security managers. The results primarily reveal that current...

متن کامل

Identify and Prioritize of Organizational Strategies by the Combination of SWOT Analysis and MCDM Approach- Case Study: kalleh Company in Gilan

The process of globalization and rapid technological developments are causing rapid changes in markets. Successfully in challenging markets of the future requires an informed and ready to respond quickly. The aim of this study is to evaluate and prioritize the organizational strategies of sales and distribution of Kalleh Company in Gilan. In order to analyze the strengths, weaknesses, opportuni...

متن کامل

Towards a Theoretical Framework of Information Systems Development Strategy: the Contingent Effects of Organizational Culture and Project Uncertainty

Although practitioners are facing increasing complexities and high rates of failure in IS development, research in the field has not yet developed adequate theory to address the issues involved. This study first analyzes the benefits and shortcomings of existing strategies of IS development, agile and traditional development, and then theorizes four underlying dimensions along which these strat...

متن کامل

Investigating the underlying factors of the establishment of knowledge management in insurance organizations: case study in Social Security Organization

Background and Aim: Knowledge management is a conscious strategy to acquire knowledge in the right time and to help individuals to share their information to improve organizational performance. This study aims to investigate the factors underlying the establishment of knowledge management in Social Security Organization. Methods: This cross-sectional study conducted in 2017. The statistical pop...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Intelligent Manufacturing

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2014