Perception of risk and the strategic impact of existing IT on information security strategy at board level

被引:44
|
作者
McFadzean, Elspeth [1 ]
Ezingeard, Jean-Noel [1 ]
Birchall, David [1 ]
机构
[1] Henley Management Coll, Ctr Business Digital Econ, Henley On Thames, England
关键词
boards; information control; data security; perception; governance;
D O I
10.1108/14684520710832333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - Information security is becoming increasingly more important as organisations are endangered by a variety of threats from both its internal and external environments. Many theorists now advocate that effective security policies should be created at senior management level. This is because executives are able to evaluate the Organisation using a holistic approach as well as having the power to ensure that new systems and procedures are implemented in a timely manner. There is, however, a continuing lack of understanding regarding the strategic importance of managing information security. In addition, there is a gap in the literature on the relationship between directors and information security strategy. This paper attempts to close this gap by exploring how directors perceive their Organisation's security and what factors influence their decisions on the development and implementation of information security strategy. Design/methodology/approach - The research is based 011 constructivist grounded theory. Forty-three interviews were conducted at executive level in 29 organisations. These interviews were then coded and analysed in order to develop new theory on directors' perception of risk and its effect on the development and implementation of information security strategy. Findings - The analysis shows that senior managers' engagement with information security is dependent on two key variables: the strategic importance of information systems to their organisation and their perception of risk. Additionally, this research found that these two variables are affected by both organisational contextual factors and the strategic and operational actions undertaken within the business. Furthermore, the results demonstrated that the two board variables also have an impact on the Organisation's environment as well as its strategic and operational actions. This paper uses the data gathered from the inter-views to develop a model of these factors. In addition, a perception grid is constructed which illustrates the potential concerns that can drive board engagement. Practical implications - The paper illustrates the advantages of using the perception grid to understand and develop current and future information security issues. Originality/value - The paper investigates how organisational directors perceive information security and how this perception influences the development of their information security strategy.
引用
收藏
页码:622 / 660
页数:39
相关论文
共 50 条
  • [21] A Model to Assess the Maturity Level of the Risk Management Process in Information Security
    Mayer, Janice
    Fagundes, Leonardo Lemes
    2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, : 61 - 70
  • [22] Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry
    Kitsios, Fotis
    Chatzidimitriou, Elpiniki
    Kamariotou, Maria
    SUSTAINABILITY, 2022, 14 (03)
  • [23] Improving Organizational Information Security Strategy via Meso-Level Application of Situational Crime Prevention to the Risk Management Process
    Beebe, Nicole Lang
    Rao, V. Srinivasan
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2010, 26 : 329 - 358
  • [24] Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process
    Beebe N.L.
    Rao S.V.
    Communications of the Association for Information Systems, 2010, 26 (01): : 329 - 358
  • [25] The Impact of eBusiness and the Information Society on ‘STRATEGY’ and ‘STRATEGIC PLANNING’: An Assessment of New Concepts and Challenges
    Claudia Loebbecke
    Jonathan Wareham
    Information Technology and Management, 2003, 4 (2-3) : 165 - 182
  • [26] Quantifying security risk level from CVSS estimates of frequency and impact
    Houmb, Siv Hilde
    Franqueira, Virginia N. L.
    Engum, Erlend A.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (09) : 1622 - 1634
  • [27] Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact
    Renaud, Karen
    Warkentin, Merrill
    NEW SECURITY PARADIGMS WORKSHOP (NSPW 2017), 2017, : 57 - 69
  • [28] Information security risk management model for mitigating the impact on SMEs in Peru
    Carnero Garay, Daniel Felipe
    Antonio, Marcos
    Ramos, Carbajal
    Armas-Aguirre, Jimmy
    Madrid Molina, Juan Manuel
    2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [29] Semi-automated Information Security Risk Assessment Framework for Analyzing Enterprises Security Maturity Level
    Abazi, Blerton
    Ko, Andrea
    RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS, CONFENIS 2019, 2019, 375 : 141 - 152
  • [30] The Strategic Alignment between Knowledge Management and Information Systems Strategy: The Impact of Contextual and Cultural Factors
    Al-Ammary, Jafiah
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2014, 13 (01)