Analyzing trajectories of information security awareness

被引:32
作者
Tsohou, Aggeliki [1 ]
Karyda, Maria [1 ]
Kokolakis, Spyros [1 ]
Kiountouzis, Evangelos [2 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Samos, Greece
[2] Athens Univ Econ & Business, Dept Informat, Athens, Greece
关键词
Information security management; Information security awareness; Actor network theory; Due process; Data security; Information management; ACTOR-NETWORK; STRATEGY;
D O I
10.1108/09593841211254358
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
050302 [传播学]; 071101 [系统理论];
摘要
Purpose - Recent global security surveys indicate that security training and awareness programs are not working as well as they could be and that investments made by organizations are inadequate. The purpose of the paper is to increase understanding of this phenomenon and illuminate the problems that organizations face when trying to establish an information security awareness program. Design/methodology/approach - Following an interpretive approach the authors apply a case study method and employ actor network theory (ANT) and the due process for analyzing findings. Findings - The paper contributes to both understanding and managing security awareness programs in organizations, by providing a framework that enables the analysis of awareness activities and interactions with the various organizational processes and events. Practical implications - The application of ANT still remains a challenge for researchers since no practical method or guide exists. In this paper the application of ANT through the due process model extension is enhanced and practically presented. This exploration highlights the fact that information security awareness initiatives involve different stakeholders, with often conflicting interests. Practitioners must acquire, additionally to technical skills, communication, negotiation and management skills in order to address the related organizational and managerial issues. Moreover, the results of this inquiry reveal that the role of artifacts used within the awareness process is not neutral but can actively affect it. Originality/value - This study is one of the first to examine information security awareness as a managerial and socio-technical process within an organizational context
引用
收藏
页码:327 / 352
页数:26
相关论文
共 52 条
[1]
[Anonymous], 2010, J INFORM SYSTEM SECU
[2]
[Anonymous], 12 ANN GLOB INF SEC
[3]
[Anonymous], 2005, ISO/IEC 27001
[4]
[Anonymous], 2003, Special Publication (SP) 800-50, building an information technology security awareness and training program
[5]
THE CASE RESEARCH STRATEGY IN STUDIES OF INFORMATION-SYSTEMS [J].
BENBASAT, I ;
GOLDSTEIN, DK ;
MEAD, M .
MIS QUARTERLY, 1987, 11 (03) :369-386
[6]
BERR, 2008, TECHNICAL REPORT
[7]
Brooks L, 2004, INFORMATION SYSTEMS RESEARCH: RELEVANT THEORY AND INFORMED PRACTICE, P389
[8]
Callon M., 1981, INTEGRATION MICRO MI, P259
[9]
Callon Michel., 1986, Power, Action, Belief: A New Sociology of Knowledge?, DOI [DOI 10.1111/J.1467-954X.1984.TB00113.X, 10.1111/j.1467-954X.1984.tb00113.x]
[10]
Cecez-Kecmanovic D., 2008, P 19 AUSTR C INF SYS, P196