2019
DOI: 10.1080/17517575.2019.1605000
|View full text |Cite
|
Sign up to set email alerts
|

Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 58 publications
0
2
0
Order By: Relevance
“…Significant empirical evidence from literature revealed that the ubiquitous alarming rate of digital data flow requires the deployment of data governance or data intelligence solutions, a situation theorized by [32], as the "datafication" of society, where digital data can easily be produced, stored and processed in a way that has no historical precedent. Significant empirical evidence from literature revealed that with the volume of data flow and the latest advances in technology, such as the Internet of Things (IoT), the digital universe is being threatened by cybercrime incidents that are on the rise globally [30], [32], and [43]. It is required that organizations take a holistic view as to how they secure information and services, since these technologies may have the least complexity and are unlikely to be innately secure [30] and [53].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Significant empirical evidence from literature revealed that the ubiquitous alarming rate of digital data flow requires the deployment of data governance or data intelligence solutions, a situation theorized by [32], as the "datafication" of society, where digital data can easily be produced, stored and processed in a way that has no historical precedent. Significant empirical evidence from literature revealed that with the volume of data flow and the latest advances in technology, such as the Internet of Things (IoT), the digital universe is being threatened by cybercrime incidents that are on the rise globally [30], [32], and [43]. It is required that organizations take a holistic view as to how they secure information and services, since these technologies may have the least complexity and are unlikely to be innately secure [30] and [53].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Significant empirical evidence from literature revealed that with the volume of data flow and the latest advances in technology, such as the Internet of Things (IoT), the digital universe is being threatened by cybercrime incidents that are on the rise globally [30], [32], and [43]. It is required that organizations take a holistic view as to how they secure information and services, since these technologies may have the least complexity and are unlikely to be innately secure [30] and [53]. DG is an emerging subject in information system security in recent years, following the dramatically increasing volume of data used within organizations and the critical role data play in business operations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Trade-offs seem fair for the employee's choice of win-or-lose. Trade-off judgment is widely recognized in applying IS or IT to information security practices (Loft et al, 2021). From the employer's perspective, gain-promotion and loss-prevention mechanisms render an intentional trade-off between the gain from compliance and the loss from non-compliance, which may mistake the insider-centric approach, i.e., the employee rather than the employer is making the choice (accountability), to foster ISP compliance.…”
Section: An Imbalanced Trade-offmentioning
confidence: 99%
“…We consider the "dark side" phenomena of information security control as imposed inevitable barriers that aggregately discourage employees from developing compliance behaviour and even cause negative emotional response, such as technological invasion for monitoring personal freedom of information use (Tarafdar, Gupta, & Turel, 2013). Internal threat that stems from employees is the most significant factor of security failure (Loft, He, Janicke, & Wagner, 2021). We extend the notion by rethinking the role of employees in Chinese security practices that differ from Western contexts.…”
Section: Introductionmentioning
confidence: 99%