2009
DOI: 10.1108/09685220910944722
|View full text |Cite
|
Sign up to set email alerts
|

An integrated view of human, organizational, and technological challenges of IT security management

Abstract: Purpose-The purpose of this study is to determine the main challenges that IT security practitioners face in their organizations, including the interplay among human, organizational, and technological factors. Design/methodology/approach-The data set consisted of 36 semi-structured interviews with IT security practitioners from 17 organizations (academic, government, and private). The interviews were analyzed using qualitative description with constant comparison and inductive analysis of the data to identify … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
98
0
3

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 110 publications
(102 citation statements)
references
References 26 publications
(46 reference statements)
1
98
0
3
Order By: Relevance
“…Based on the results of the intial interviews, the following conceptual framework is designed as the basis of the open-ended questionnaire to collect qualitative data from 40 respendents in next step . The autors develop the conceptual framework based on the model of Human,Organization and Technology that previously used for several studies about IT security voulnerability [23] The 40 respondents of this study are selected from IT, operation and production departments of the Iranian manufacturing industries.…”
Section: Methodsmentioning
confidence: 99%
“…Based on the results of the intial interviews, the following conceptual framework is designed as the basis of the open-ended questionnaire to collect qualitative data from 40 respendents in next step . The autors develop the conceptual framework based on the model of Human,Organization and Technology that previously used for several studies about IT security voulnerability [23] The 40 respondents of this study are selected from IT, operation and production departments of the Iranian manufacturing industries.…”
Section: Methodsmentioning
confidence: 99%
“…While technology is important, organizational and human factors also form a crucial role in achieving information security [1]. Understanding of how different human, organizational, and technological elements interplay could explain how different factors lead to sources of security breaches and vulnerabilities within organizations [15], [30]. Since each dimension has human involvement, even if the organizational dimension is added, protection may not be sufficient as both the organizational and technology dimensions depend on the H dimension.…”
Section: Anti-phishing Framework: Phishing For a Solutionmentioning
confidence: 99%
“…It is the responsibility of all employees to protect information thus defending the reputation and financial wellbeing of the business [2]. Effective interactions and communications are required to reach a mutual understanding about security risks among different stakeholders [30]. An information security culture needs to be adopted to ensure that information security becomes a natural aspect in the daily practice of every employee.…”
Section: Information Security Management and Culturementioning
confidence: 99%
“…Information security is an interdisciplinary field encompassing aspects of organization, management, and technology (Werlinger, Hawkey, & Beznosov, 2009). Most efforts in this field have been traditionally dedicated to technical or managerial issues.…”
Section: Information Security Policy (Isp)mentioning
confidence: 99%