Information security policy: An organizational-level process model

被引:100
作者
Knapp, Kenneth J. [1 ]
Morris, R. Franklin, Jr. [2 ]
Marshall, Thomas E. [3 ]
Byrd, Terry Anthony [3 ]
机构
[1] Univ Tampa, John H Sykes Coll Business, Tampa, FL 33606 USA
[2] The Citadel, Sch Business Adm, Charleston, SC 29409 USA
[3] Auburn Univ, Coll Business, Auburn, AL 36849 USA
关键词
Information security policy; Governance; Policy development; Policy management; Policy process model; SYSTEMS; STANDARDS; DESIGN;
D O I
10.1016/j.cose.2009.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To protect information systems from increasing levels of cyber threats, organizations are compelled to institute security programs. Because information security policies are a necessary foundation of organizational security programs, there exists a need for scholarly contributions in this important area. Using a methodology involving qualitative techniques, we develop an information security policy process model based on responses from a sample of certified information security professionals. As the primary contribution of this research study, the proposed model illustrates a general yet comprehensive policy process in a distinctive form not found in existing professional standards or academic publications. This study's model goes beyond the models illustrated in the literature by depicting a larger organizational context that includes key external and internal influences that can materially impact organizational processes. The model that evolved from the data in this research reflects the recommended practices of our sample of certified professionals, thus providing a practical representation of an information security policy process for modern organizations. Before offering our concluding comments, we compare the results of the study with the literature in both theory and practice and also discuss limitations of the study. To the benefit of the practitioner and research communities alike, the model in this study offers a step forward, as well as an opportunity for making further advancements in the increasingly critical area of information security policy. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:493 / 508
页数:16
相关论文
共 58 条
[1]  
Andrews K.R., 1987, The Concept of Corporate Strategy
[2]  
[Anonymous], 1996, NIST SP
[3]  
[Anonymous], CROSS CULTURAL CHALL
[4]  
[Anonymous], 1957, Administrative behavior
[5]  
[Anonymous], 2005, 270022005 ISOIEC
[6]  
Ansoff H.I., 1965, CORPORATE STRATEGY
[7]  
Bacik S., 2008, Building an effective information security policy architecture
[8]  
Backhouse J, 2006, MIS QUART, V30, P413
[9]  
Barman S., 2002, WRITING INFORM SECUR
[10]  
Baskerville R., 2002, Logistics Information Management, V15, P337, DOI 10.1108/09576050210447019