The Weakest Link Human Behaviour and the Corruption of Information Security Management in Organisations - an Analytical Framework

被引:0
|
作者
Holmberg, Robert [1 ]
Sundstrom, Mikael [2 ]
机构
[1] Lund Univ, Dept Psychol, SE-22100 Lund, Sweden
[2] Lund Univ, Dept Polit Sci, SE-22100 Lund, Sweden
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we introduce the norm-injection analysis framework, a construct which can be employed to aid analysis of processes that affect information security management (ISM) in organisations. The underpinnings of this framework draw on and evolve - theories about how apparently mundane organisational processes, particularly managerial demands on employees, may in some instances lead to undesired, perhaps calamitous, consequences. Because the mechanisms between input (demand) and the adverse consequences work by gradually accruing and multiplying Subtle communication "problemettes" into major problems, they are almost undetectable to the untrained eye. Breaches of ISM protocol may appear wholly mysterious to the crash investigators brought in to analyse, post-event, what went wrong. The norm-injection analysis framework is intended to shed light on these below-the-radar processes, and to supplement the tool set an organisation analyst has at his disposal when preparing or evaluating strategic ISM measures.
引用
收藏
页码:94 / +
页数:2
相关论文
共 50 条
  • [1] Human Factor: The Weakest Link of Security?
    Jasek, Roman
    Sarga, Libor
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 317 - 326
  • [2] Analytical Hierarchy Process Approach for the Metrics of Information Security Management Framework
    Moeti, Michael
    Kalema, Billy Mathias
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2014, : 89 - 94
  • [3] A FRAMEWORK FOR INFORMATION SECURITY MANAGEMENT
    Angheluta, Dragos-Ionut
    Lupu, Luminita-Mihaela
    [J]. FROM MANAGEMENT OF CRISIS TO MANAGEMENT IN A TIME OF CRISIS, 2016, : 2 - 16
  • [4] A framework for the management of information security
    Leiwo, J
    Zheng, YL
    [J]. INFORMATION SECURITY, 1998, 1396 : 232 - 245
  • [5] Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
    Heartfield, Ryan
    Loukas, George
    [J]. COMPUTERS & SECURITY, 2018, 76 : 101 - 127
  • [6] Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
    Sasse, MA
    Brostoff, S
    Weirich, D
    [J]. BT TECHNOLOGY JOURNAL, 2001, 19 (03) : 122 - 131
  • [7] Investigating the information security management role in smart city organisations
    Hasbini, Mohamad Amin
    Eldabi, Tillal
    Aldallal, Ammar
    [J]. WORLD JOURNAL OF ENTREPRENEURSHIP MANAGEMENT AND SUSTAINABLE DEVELOPMENT, 2018, 14 (01) : 86 - 98
  • [8] A conceptual framework for information security management
    Finne, T
    [J]. COMPUTERS & SECURITY, 1998, 17 (04) : 303 - 307
  • [9] A framework for the management of information security risks
    Jones, A.
    [J]. BT TECHNOLOGY JOURNAL, 2007, 25 (01) : 30 - 36
  • [10] An Integrated Framework for Information Security Management
    Ma, Qingxiong
    Schmidt, Mark B.
    Pearson, J. Michael
    [J]. REVIEW OF BUSINESS, 2009, 30 (01): : 58 - 69