Information systems security policy implementation in practice: from best practices to situated practices

被引:33
|
作者
Niemimaa, Elina [1 ]
Niemimaa, Marko [2 ]
机构
[1] Tampere Univ Technol, Dept Informat Management & Logist, Korkeakoulunkatu 10, Tampere 33720, Finland
[2] Univ Turku, Turku Ctr Comp Sci Informat Syst Sci, Turku, Finland
关键词
IS security; IS security policy; practice theory; ethnography; PRACTICE PERSPECTIVE; TECHNOLOGY; MANAGEMENT; STANDARDS; TRANSLATION; FIELD; POWER; INSTITUTIONS; RATIONALITY; GOVERNANCE;
D O I
10.1057/s41303-016-0025-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations face institutional pressure to adopt information systems security (ISS) best practices to manage risks to their information assets. The literature shows that best practices should be contextualized, that is, translated from universal and general prescriptions into organizational documents and practices. Yet, little is known about how organizations actually make the translation from the best practices into situated practices. In this ethnographic study, we draw on practice theory and related concepts of canonical and non-canonical practices to analyze the process of translation. We explore how an IT service provider translated the ISS best practice of information classification into an ISS policy and into situated practices. We identify three translation mechanisms: (1) translating global to local, (2) disrupting and reconstructing local non-canonical practices, and (3) reconstructing and enacting local canonical practices. We find that while the translation was inhibited by incongruent practices, insufficient understanding of employees' work, and the ISS managers' lack of engagement in organizational practices, allowing situated practices to shape the ISS policy and actively engaging employees in the reconstruction of situated practices contributed positively to the translation. Contributions and implications for research and practice are discussed and conclusions are drawn.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [1] Challenges and Best Practices in Information Security Management
    McLaughlin, Mark-David
    Gogan, Janis
    [J]. MIS QUARTERLY EXECUTIVE, 2018, 17 (03) : 237 - 262
  • [2] Best Practices for the Security Evaluation of Biometric Systems
    Fernandez-Saavedra, Belen
    Sanchez-Reillo, Raul
    Liu-Jimenez, Judith
    Gutierrez Ruiz, Jorge
    [J]. 2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [3] Best practices in information security protection for the utility enterprise
    Klein, SA
    [J]. 2002 IEEE POWER ENGINEERING SOCIETY WINTER MEETING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2002, : 636 - 637
  • [4] ISO 17799: "BEST PRACTICES" IN INFORMATION SECURITY MANAGEMENT?
    Ma, Qingxiong
    Pearson, J. Michael
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2005, 15 : 577 - 591
  • [5] Applying Best Practices from Digital Control Systems to BMI Implementation
    Matlack, Charlie
    Moritz, Chet
    Chizeck, Howard
    [J]. 2012 ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2012, : 1699 - 1702
  • [6] Goals and Practices in Maintaining Information Systems Security
    Erlich, Zippy
    Zviran, Moshe
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (03) : 40 - 50
  • [7] Information Security Best Practices: First Steps for Startups and SMEs
    Kaila, Urpo
    Nyman, Linus
    [J]. TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2018, 8 (11): : 32 - 42
  • [8] Best practices in faith-health partnerships for policy implementation
    Bailey, Stephanie B. C.
    Cerio, Timothy M.
    Stanley, Covia L.
    Harp, Toni X.
    [J]. JOURNAL OF LAW MEDICINE & ETHICS, 2007, 35 (04): : 129 - 131
  • [9] Information security best practices: 205 basic rules.
    Gordon, R
    [J]. LIBRARY JOURNAL, 2003, 128 (04) : 112 - 112
  • [10] Best practices cyber security
    Scherer, Rob
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2019, 257