Policy components - a conceptual model for modularizing and tailoring of information security policies

被引:1
|
作者
Rostami, Elham [1 ]
Karlsson, Fredrik [1 ]
Gao, Shang [1 ]
机构
[1] Orebro Univ, Dept Informat, Orebro, Sweden
关键词
Information security policy; Information security management; Policy component; Situational method engineering; Policy design; DESIGN SCIENCE;
D O I
10.1108/ICS-10-2022-0160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
PurposeThis paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs). Design/methodology/approachThis study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden. FindingsThis study's demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs. Research limitations/implicationsThe proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process. Practical implicationsPractitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs. Originality/valueThe proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.
引用
收藏
页码:331 / 352
页数:22
相关论文
共 50 条
  • [41] Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact
    Iqbal, Sarfraz
    Thapa, Devinder
    Awad, Ali Ismail
    Paivarinta, Tero
    [J]. 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 43 - 52
  • [42] A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks' Efficiency
    Sonmez, Ferda Ozdemir
    [J]. 10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 181 - 188
  • [43] A conceptual model of security context
    Jovanovikj, Vladimir
    Gabrijelcic, Dusan
    Klobucar, Tomaz
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (06) : 571 - 581
  • [44] Why information security is a long and winding road? A conceptual framework and a contingency model
    Lin, M
    Chen, JR
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 53 - 58
  • [45] A conceptual model for investigating factors influencing information security culture in healthcare environment
    Hassan, Noor Hafizah
    Ismail, Zuraini
    [J]. INTERNATIONAL CONGRESS ON INTERDISCIPLINARY BUSINESS AND SOCIAL SCIENCES 2012 (ICIBSOS 2012), 2012, 65 : 1007 - 1012
  • [46] A conceptual model of security context
    Vladimir Jovanovikj
    Dušan Gabrijelčič
    Tomaž Klobučar
    [J]. International Journal of Information Security, 2014, 13 : 571 - 581
  • [47] Optimal policies for information sharing in information system security
    Solak, Senay
    Zhuo, Yueran
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2020, 284 (03) : 934 - 950
  • [48] A Conceptual Model for Knowledge Sharing Towards Information Security Culture in Healthcare Organization
    Hassan, Noor Hafizah
    Ismail, Zuraini
    Maarop, Norazean
    [J]. 2013 INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS), 2013, : 516 - 520
  • [49] Information security policy architecture
    Alam, Mehtab
    Bokhari, M. U.
    [J]. ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 120 - +
  • [50] Design of network security policy information model for policy-based network management
    Sohn, SG
    Kim, J
    Na, JC
    [J]. 7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705