Information systems security policy implementation in practice: from best practices to situated practices

被引:33
|
作者
Niemimaa, Elina [1 ]
Niemimaa, Marko [2 ]
机构
[1] Tampere Univ Technol, Dept Informat Management & Logist, Korkeakoulunkatu 10, Tampere 33720, Finland
[2] Univ Turku, Turku Ctr Comp Sci Informat Syst Sci, Turku, Finland
关键词
IS security; IS security policy; practice theory; ethnography; PRACTICE PERSPECTIVE; TECHNOLOGY; MANAGEMENT; STANDARDS; TRANSLATION; FIELD; POWER; INSTITUTIONS; RATIONALITY; GOVERNANCE;
D O I
10.1057/s41303-016-0025-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations face institutional pressure to adopt information systems security (ISS) best practices to manage risks to their information assets. The literature shows that best practices should be contextualized, that is, translated from universal and general prescriptions into organizational documents and practices. Yet, little is known about how organizations actually make the translation from the best practices into situated practices. In this ethnographic study, we draw on practice theory and related concepts of canonical and non-canonical practices to analyze the process of translation. We explore how an IT service provider translated the ISS best practice of information classification into an ISS policy and into situated practices. We identify three translation mechanisms: (1) translating global to local, (2) disrupting and reconstructing local non-canonical practices, and (3) reconstructing and enacting local canonical practices. We find that while the translation was inhibited by incongruent practices, insufficient understanding of employees' work, and the ISS managers' lack of engagement in organizational practices, allowing situated practices to shape the ISS policy and actively engaging employees in the reconstruction of situated practices contributed positively to the translation. Contributions and implications for research and practice are discussed and conclusions are drawn.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [31] Are Best Practices Really Best? A Review of the Best Practices Literature in Library and Information Studies
    Druery, Jackie
    McCormack, Nancy
    Murphy, Sharon
    [J]. EVIDENCE BASED LIBRARY AND INFORMATION PRACTICE, 2013, 8 (04): : 110 - 128
  • [32] Best Practices for Software Security: An Overview
    Yasar, Ansar-Ul-Haque
    Preuveneers, Davy
    Berbers, Yolande
    Bhatti, Ghasan
    [J]. INMIC: 2008 INTERNATIONAL MULTITOPIC CONFERENCE, 2008, : 169 - +
  • [33] NFV: Security Threats and Best Practices
    Lal, Shankar
    Taleb, Tarik
    Dutta, Ashutosh
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (08) : 211 - 217
  • [34] Mobile Security: Threats and Best Practices
    Weichbroth, Pawel
    Lysik, Lukasz
    [J]. MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [35] Best practices implementation integrates utilities' organization, practices, and technology
    Lutchman, Roopchan
    Pickett, R.M.
    [J]. Public Works, 2002, 133 (11):
  • [36] Innovative strategies for the implementation of best practices
    van Dale, D.
    Leenaars, K.
    [J]. EUROPEAN JOURNAL OF PUBLIC HEALTH, 2019, 29 : 189 - 189
  • [37] SYSTEMATIZATION OF BEST PRACTICES FOR ECODESIGN IMPLEMENTATION
    Pigosso, D. C. A.
    McAloone, T. C.
    Rozenfeld, H.
    [J]. DS 77: PROCEEDINGS OF THE DESIGN 2014 13TH INTERNATIONAL DESIGN CONFERENCE, VOLS 1-3, 2014, : 1651 - 1662
  • [38] Best practices implementation in mutual funds
    Nelson, Donald
    Wells, William H.
    Perry, Kevin J.
    Hanson, Donald
    [J]. JOURNAL OF FINANCIAL REGULATION AND COMPLIANCE, 2005, 13 (01) : 80 - 86
  • [39] Implementation of oral care best practices
    Kitchen-Clark, T.
    [J]. INTERNATIONAL JOURNAL OF STROKE, 2015, 10 : 66 - 66
  • [40] Implementation of an Information Systems Security Policy: Action Research
    Lopes, Isabel
    Oliveira, Pedro
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON RESEARCH METHODOLOGY FOR BUSINESS AND MANAGEMENT STUDIES (ECRM 2014), 2014, : 244 - 252