Triggers of Change in Information Security Management Practices

被引:8
|
作者
Ezingeard, Jean-Noel [1 ]
Bowen-Schrire, Monica [2 ]
机构
[1] Kingston Univ, Kingston Business Sch, Surrey, England
[2] EnergiTek, Segeltorp, Sweden
关键词
D O I
10.1177/030630700703200404
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Continuous improvements in information security are important in order to ensure that an organisation is adequately protected. Industry codes of practice, international standards and sometimes regulatory and legislative frameworks recommend that reviews should take place at least once a year, and that these reviews should involve various levels in the organisation, including senior management and the board. However, there is evidence that these reviews do not happen as often as recommended. Here, we investigate the kinds of triggers, that can cause an organisation to review its information security policy and policy implementation. We also examine which actors are involved in the information security change process and what form such change takes. The research is based on 26 structured interviews carried out in Sweden and the UK. The results show that awareness of risk amongst directors and senior managers influences how often information security reviews take place and the outcome of these reviews. Apart from reviews, change in information security management (ISM) practice is often triggered by internal or external events.
引用
收藏
页码:53 / 72
页数:20
相关论文
共 50 条
  • [21] Measuring user satisfaction with information security practices
    Zimmermann Montesdioca, Gustavo Percio
    Gastaud Magada, Antonio Carlos
    [J]. COMPUTERS & SECURITY, 2015, 48 : 267 - 280
  • [22] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [23] IT/IS SECURITY MANAGEMENT WITH UNCERTAIN INFORMATION
    Klimes, Cyril
    Bartos, Jiri
    [J]. KYBERNETIKA, 2015, 51 (03) : 408 - 419
  • [24] STANDARDIZATION IN INFORMATION SECURITY MANAGEMENT
    Fal', A. M.
    [J]. CYBERNETICS AND SYSTEMS ANALYSIS, 2010, 46 (03) : 512 - 515
  • [25] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [26] Goals and Practices in Maintaining Information Systems Security
    Erlich, Zippy
    Zviran, Moshe
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (03) : 40 - 50
  • [27] Information Security Engineering: a Framework for Research and Practices
    Li, M.
    Tang, M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (04) : 578 - 587
  • [28] The Construction of Information Security Management
    Quan, Yin
    [J]. SOCIAL SCIENCE AND EDUCATION, 2013, 10 : 519 - 521
  • [29] A framework for the management of information security
    Leiwo, J
    Zheng, YL
    [J]. INFORMATION SECURITY, 1998, 1396 : 232 - 245
  • [30] Knowledge management and information security
    Buogo, Mateus
    Fachinelli, Ana Cristina
    Giacomello, Cintia Paese
    [J]. ATOZ-NOVAS PRATICAS EM INFORMACAO E CONHECIMENTO, 2019, 8 (02): : 49 - 59