Analyzing Trajectories of Information Security Awareness
نویسندگان
چکیده
Purpose: Recent global security surveys indicate that security training and awareness programs are not working as well as they could be and that investments made by organizations are inadequate. The purpose of the paper is to increase our understanding of this phenomenon and illuminate the problems that organizations face when trying to establish an information security awareness program. Design/methodology/approach: Following an interpretive approach we apply a case study method and we employ Actor Network Theory (ANT) and the Due Process for analyzing our findings. Findings: The paper contributes to both understanding and managing security awareness programs in organizations, by providing a framework that enables the analysis of awareness activities and interactions with the various organizational processes and events. Practical implications: The application of ANT still remains a challenge for researchers since no practical method or guide exists. In this paper we enhance and practically present the application of ANT through the due process model extension. Our exploration highlights the fact that information security awareness initiatives involve different stakeholders, with often conflicting interests. Practitioners must acquire, additionally to technical skills, communication, negotiation and management skills in order to address the related organizational and managerial issues. Moreover, the results of our inquiry reveal that the role of artifacts used within the awareness process is not neutral but can actively affect it. Originality/value: This study is one of the first to examine information security awareness as a managerial and socio-technical process within an organizational context.
منابع مشابه
Statistical Analysis on Relation between Workers’ Information Security Awareness and the Behaviors in Japan
This paper discusses the relationship between information security awareness and behavior by analyzing data collected from a Web-based survey on information security measures in Japan. First, it is found that individuals would not have problematic behavior from the viewpoint of information security measures if the individual’s awareness is higher. Next, it is found that the awareness of individ...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملInformation Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures
Information security awareness (ISA) is referred to as a state of consciousness where user ideally committed to the rules, recognize the potentiality, understand the importance of responsibilities and act accordingly. Despite the number of case occurred in information security breaches, especially at knowledge-based institution result from the reluctance of user's failure to comply with securit...
متن کاملPortunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain
The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining physical, digital and social means. This paper presents the Portunes model, a model for describing and...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IT & People
دوره 25 شماره
صفحات -
تاریخ انتشار 2012