2019
DOI: 10.1108/ics-09-2018-0108
|View full text |Cite
|
Sign up to set email alerts
|

From theory to practice: guidelines for enhancing information security management

Abstract: Purpose This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with current security management practices, including those following the widely adopted information security standards ISO 27001, 27002, 27003 and 27005. Design/methodology/approach Based on an exhaustive analysis of related literature, the authors identify critical factors influencing employee security behaviour and ISP compliance. The auth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(25 citation statements)
references
References 39 publications
0
15
0
Order By: Relevance
“…The most relevant one is related to the security controls, in particular considering the set of 133 controls described in the (Liao and Chueh, 2012b), entailed too rigid procedures (Crowder, 2013) and were costly to implement due to the possibility of an only partial automation through hardware and software tools (Montesino et al, 2012). As for the new version of the ISO/IEC 27001, Ho et al (2015) note that the standard still does not provide guidance on the mutual interdependence among the different control items; similarly, Stewart (2018) and Topa and Karyda (2019) refer to the lack of indications regarding a cost/benefit assessment in the selection of controls. On this, Bettaieb et al (2019) propose an approach based on machine learning for the identification of the most relevant controls, given the characteristics and the context of the implementing organization.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The most relevant one is related to the security controls, in particular considering the set of 133 controls described in the (Liao and Chueh, 2012b), entailed too rigid procedures (Crowder, 2013) and were costly to implement due to the possibility of an only partial automation through hardware and software tools (Montesino et al, 2012). As for the new version of the ISO/IEC 27001, Ho et al (2015) note that the standard still does not provide guidance on the mutual interdependence among the different control items; similarly, Stewart (2018) and Topa and Karyda (2019) refer to the lack of indications regarding a cost/benefit assessment in the selection of controls. On this, Bettaieb et al (2019) propose an approach based on machine learning for the identification of the most relevant controls, given the characteristics and the context of the implementing organization.…”
Section: Methodsmentioning
confidence: 99%
“…Another issue underscored in the studies concerns the fact that ISO/IEC 27001 does not provide adequate guidance on cultural and psychological dimensions relevant for ensuring employees' compliance (Van Wessel et al , 2011). As highlighted by Topa and Karyda (2019), there are only limited indications regarding the appraisal of individual habits and values, e.g. privacy concerns and compliance attitude.…”
Section: Thematic Findingsmentioning
confidence: 99%
See 2 more Smart Citations
“…To address the second research question, a clear picture of the security management practices that are currently implemented in organisations was needed. As most organisations adhere to the widely accepted international standards, including the ISO family of standardsparticularly ISO 27001, 27002, 27003 and 27005-this Thesis conducts a gap analysis of these standards to enable a comparison between literature findings and current practices, and provide directions and guidelines to address the identified gaps (Topa & Karyda, 2019). Moreover, a case study was conducted to investigate the security management practices followed in a large organization and show how the knowledge on factors influencing security behavior can be incorporated into security management practices to improve ISP compliance and the overall security posture of organisations.…”
Section: Information Security Policy Compliance and Security Behaviour: Backgroundmentioning
confidence: 99%