A systematic framework to explore the determinants of information security policy development and outcomes

被引:3
|
作者
Stewart, Harrison [1 ]
机构
[1] Univeril, Dept Informat Technol, Hamburg, Germany
关键词
ISP development; Information security procedure; Nine-Five-circle (NFC); Information systems security; Information security commitment; Employee behaviour; Information security policy development; Information security policy; MANAGEMENT; DETERRENCE; TAXONOMY;
D O I
10.1108/ICS-06-2021-0076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose This paper aims to develop an effective information security policy (ISP), which is an important mechanism to combat insider threats. Design/methodology/approach A general framework based on the Nine-Five-circle was proposed for developing, implementing and evaluating an organisation's ISP. Findings The proposed framework outlines the steps involved in developing, implementing and evaluating a successful ISP. Research limitations/implications The study took place in Germany, and most of the data was collected virtually due to the different locations of the organisation. Practical implications In practice, this study can be a guide for managers to design a robust ISP that employees will read and follow. Social implications Employee compliance with the ISP is a critical aspect in any organisation and therefore a rigorous strategy based on a systematic approach is required. Originality/value The main contribution of the paper is the application of a comprehensive and coherent model that can be the first step in defining a "checklist" for creating and managing ISPs.
引用
收藏
页码:490 / 516
页数:27
相关论文
共 50 条
  • [1] A Generic Framework for Information Security Policy Development
    Ismail, Wan Basri Wan
    Widyarto, Setyawan
    Ahmad, Raja Ahmad Tariqi Raja
    Abd Ghani, Khatipah
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 320 - 325
  • [2] PFIRES: A policy framework for information security
    Rees, J
    Bandyopadhyay, S
    Spafford, EH
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (07) : 101 - 106
  • [3] Information Systems Strategy and Security Policy: A Conceptual Framework
    Kamariotou, Maria
    Kitsios, Fotis
    [J]. ELECTRONICS, 2023, 12 (02)
  • [4] Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective
    Al Nuaim, Abdullah
    Ramirez, Ronald
    Dincelli, Ersin
    [J]. AMCIS 2020 PROCEEDINGS, 2020,
  • [5] Information security policies in large organisations: Developing a conceptual framework to explore their impact
    Doherty, NF
    Fulford, H
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 1052 - 1053
  • [6] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    [J]. FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [7] An Information Security Policy Development Life Cycle
    Tuyikeze, T.
    Pottas, D.
    [J]. PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 165 - 176
  • [8] DEVELOPMENT OF INFORMATION SECURITY POLICY FOR SMART EDUCATION
    Barlybayev, A.
    Abdymanapov, S.
    Akimbekova, G.
    [J]. 12TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED), 2018, : 8276 - 8280
  • [9] Security policy development for healthcare information systems
    Gritzalis, D
    Kokolakis, S
    [J]. ADVANCED HEALTH TELEMATICS AND TELEMEDICINE: THE MAGDEBURG EXPERT SUMMIT TEXTBOOK, 2003, 96 : 105 - 110
  • [10] State of the art in information security policy development
    Paananen, Hanna
    Lapke, Michael
    Siponen, Mikko
    [J]. COMPUTERS & SECURITY, 2020, 88