USER PARTICIPATION IN INFORMATION SYSTEMS SECURITY RISK MANAGEMENT

被引:5
作者
Spears, Janine L. [1 ]
Barki, Henri [2 ]
机构
[1] Depaul Univ, Chicago, IL 60604 USA
[2] HEC Montreal, Montreal, PQ H3T 2A7, Canada
关键词
Information security; user participation; security risk management; Sarbanes-Oxley Act; INVOLVEMENT; AWARENESS; IMPACT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper examines user participation in information systems security risk management and its influence in the context of regulatory compliance via a multi-method study at the organizational level. First, eleven informants across five organizations were interviewed to gain an understanding of the types of activities and security controls in which users participated as part of Sarbanes-Oxley compliance, along with associated outcomes. A research model was developed based on the findings of the qualitative study and extant user participation theories in the systems development literature. Analysis of the data collected in a questionnaire survey of 228 members of ISACA, a professional association specialized in information technology governance, audit, and security, supported the research model. The findings of the two studies converged and indicated that user participation contributed to improved security control performance through greater awareness, greater alignment between IS security risk management and the business environment, and improved control development. While the IS security literature often portrays users as the weak link in security, the current study suggests that users may be an important resource to IS security by providing needed business knowledge that contributes to more effective security measures. User participation is also a means to engage users in protecting sensitive information in their business processes.
引用
收藏
页码:503 / 522
页数:20
相关论文
共 65 条
  • [11] Information system security management in the new millennium
    Dhillon, G
    Backhouse, J
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (07) : 125 - 128
  • [12] Computer crimes: theorizing about the enemy within
    Dhillon, G
    Moores, S
    [J]. COMPUTERS & SECURITY, 2001, 20 (08) : 715 - 723
  • [13] The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    Dinev, Tamara
    Hu, Qing
    [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2007, 8 (07): : 386 - 408
  • [14] Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
    Doherty, Neil
    Fulford, Heather
    [J]. INFORMATION RESOURCES MANAGEMENT JOURNAL, 2005, 18 (04) : 21 - 39
  • [15] Who guides the little guy? Exploring security advice and guidance from retailers and ISPs
    Centre for Information Security and Network Research, University of Plymouth, United Kingdom, Plymouth, United Kingdom
    [J]. Comput. Fraud Secur., 2008, 12 (6-10): : 6 - 10
  • [16] Integrating case study and survey research methods: an example in information systems
    Gable, G. G.
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 1994, 3 (02) : 112 - 126
  • [17] GIRASA RJ, 2007, BUS REV, V9, P36
  • [18] SECURITY CONCERNS OF SYSTEM USERS - A STUDY OF PERCEPTIONS OF THE ADEQUACY OF SECURITY
    GOODHUE, DL
    STRAUB, DW
    [J]. INFORMATION & MANAGEMENT, 1991, 20 (01) : 13 - 27
  • [19] GORDON LA, 2005, CSI FBI COMPUTER CRI
  • [20] Halliday S., 1996, Information Management & Computer Security, V4, P19, DOI 10.1108/09685229610114178