The information security digital divide between information security managers and users

被引:74
|
作者
Albrechtsen, Eirik [1 ,2 ]
Hovden, Jan
机构
[1] Norwegian Univ Sci & Technol, Dept Ind Econ & Technol Management, SINTEF Teknol & Samfunn, N-7491 Trondheim, Norway
[2] SINTEF Technol & Soc, Dept Safety Res, N-7465 Trondheim, Norway
关键词
Information security; Digital divide; Information security managers; Users; Qualitative research; Risk perception; RISK PERCEPTION;
D O I
10.1016/j.cose.2009.01.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Empirical findings from surveys and in-depth interviews with information security managers and users indicate that a digital divide exists between these groups in terms of their views on and experience of information security practices. Information security professionals mainly regard users as an information security threat, whereas users believe themselves that they are an untapped resource for security work. The limited interaction between users and information security managers results in a lack of understanding for the other's point of view. These divergent views on and interpretations of information security mean that managers tend to base their practical method on unrealistic assumptions, resulting in management approaches that are poorly aligned with the dynamics of the users' working day. (C 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:476 / 490
页数:15
相关论文
共 50 条
  • [31] A call for research on home users' information security behaviour
    Department of Information Processing Science, University of Oulu, Oulu, Finland
    [J]. PACIS - Pac. Asia Conf. Inf. Syst.: Qual. Res. Pac.,
  • [32] Information security matters: What is information security worth?
    Ross, Steven J.
    [J]. ISACA Journal, 2019, 2 : 4 - 6
  • [33] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [34] Reaction of users as potential victims of information security breach
    Janjarasjit, Suparak
    Chan, Siew H.
    [J]. INFORMATION AND COMPUTER SECURITY, 2021, 29 (01) : 187 - 206
  • [35] Information security matters: fifty years of information security
    Ross, Steven J.
    [J]. ISACA Journal, 2019, 1 : 4 - 6
  • [36] Security architectures for controlled digital information dissemination
    Wang, Bao-You
    Hu, Yun-Fa
    [J]. 2003, Shenyang Institute of Computing Technology (24):
  • [37] Security architectures for controlled digital information dissemination
    Park, J
    Sandhu, R
    Schifalacqua, J
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 224 - 233
  • [38] Digital signatures: A solution for security in the information society
    Hickson, N
    [J]. BRITISH TELECOMMUNICATIONS ENGINEERING, 1996, 14 : 301 - 309
  • [39] Information security of food security
    Wu, Yue
    Takacs-Gyorgy, Katalin
    [J]. 2023 IEEE 21ST WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, SAMI, 2023, : 261 - 265
  • [40] Functional Security and Information Security
    不详
    [J]. ATP EDITION, 2012, (04): : 8 - 8