Applying Action Research in the Adoption of Information Systems Security Policies

被引:0
|
作者
Lopes, Isabel [1 ]
de Sa-Soares, Filipe [2 ]
机构
[1] Inst Politecn Braganca, Dept Informat & Comunicacoes, Braga, Portugal
[2] Univ Minho, Ctr Algoritmi, Guimaraes, Portugal
关键词
action research; information systems security policies; information systems security policy adoption; information security;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information Systems Security (ISS) is a critical issue for a wide range of organizations. This paper focuses on organizations belonging to a particular sector, namely Local Public Administration, where public and personal information must be protected by those in charge, and where there must be a concern to view security as a priority. There are several measures which can be implemented in order to ensure the effective protection of information assets, among which stands out the adoption of ISS policies. A recent census concluded that among the 308 Town Councils in Portugal, only 38 indicated to have an ISS policy. The conclusion drawn from that study was that the adoption of ISS policies has not become a reality yet. As an attempt to mitigate this fact, an academic-practitioner collaboration effort was established regarding the implementation of ISS policies in three Town Councils. These interventions were conceived as Action Research projects. This article aims to constitute an empirical study on the applicability of the Action Research method in information systems, more specifically through the implementation of an ISS policy in Town Councils where previous attempts to adopt a policy have failed. The research question we intend to answer is to what extent this research method is adequate to reach the proposed goal. The results of the study suggest that Action Research is a promising means for the institutionalization of ISS policies adoption. It can both act as a research method, improving the understanding among researchers about the issues that hinder such adoption, and as a change method, assisting practitioners to overcome barriers that have prevented the implementation of ISS policies.
引用
收藏
页码:219 / 226
页数:8
相关论文
共 50 条
  • [1] Applying Action Research in the Formulation of Information Security Policies
    Lopes, Isabel
    Oliveira, Pedro
    [J]. NEW CONTRIBUTIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, PT 1, 2015, 353 : 513 - 522
  • [2] INSTITUTIONALIZATION OF INFORMATION SYSTEMS SECURITY POLICIES ADOPTION: FACTORS AND GUIDELINES
    Lopes, Isabel Maria
    de Sa-Soares, Filipe
    [J]. IADIS-INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 9 (02): : 82 - 95
  • [3] Implementation of an Information Systems Security Policy: Action Research
    Lopes, Isabel
    Oliveira, Pedro
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON RESEARCH METHODOLOGY FOR BUSINESS AND MANAGEMENT STUDIES (ECRM 2014), 2014, : 244 - 252
  • [4] Definition of Information Systems Security Policies
    Lopes, Isabel Maria
    Pereira, Joao Paulo
    Oliveira, Pedro
    [J]. RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, 2017, 571 : 225 - 234
  • [5] Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
    Santos-Olmo, Antonio
    Enrique Sanchez, Luis
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. FUTURE INTERNET, 2016, 8 (03):
  • [6] Evaluation of the Adoption of an Information Systems Security Policy
    Lopes, Isabel Maria
    Oliveira, Pedro
    [J]. 2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2015,
  • [7] Identifying Influences to Information Security Framework Adoption: Applying a Modified UTAUT
    Lidster, William W.
    Rahman, Shawon S. M.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2605 - 2609
  • [8] Information systems security policies: a contextual perspective
    Karyda, M
    Kiountouzis, E
    Kokolakis, S
    [J]. COMPUTERS & SECURITY, 2005, 24 (03) : 246 - 260
  • [9] Research on User Adoption of Information Systems
    Zhao, Xin
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND INFORMATION TECHNOLOGY PROCESSING (AMITP 2016), 2016, 60 : 300 - 303
  • [10] Applying composable security properties to assessment of information systems
    Shi, Q
    Zhang, N
    [J]. TWENTIETH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE (COMPSAC'96), PROCEEDINGS, 1996, 20 : 118 - 123