2009
DOI: 10.1016/j.istr.2010.04.005
|View full text |Cite
|
Sign up to set email alerts
|

Information security management: An entangled research challenge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
11
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(13 citation statements)
references
References 10 publications
2
11
0
Order By: Relevance
“…Although risks often result from human behavior directly or indirectly, the human component has long been neglected by systemic risks studies [ 35 , 36 ]. An interpretive perspective within risk management is called for because it would lead to a multidimensional view [ 37 ] that goes beyond the simplistic explanations provided by the functionalist paradigm.…”
Section: Research Modelmentioning
confidence: 99%
“…Although risks often result from human behavior directly or indirectly, the human component has long been neglected by systemic risks studies [ 35 , 36 ]. An interpretive perspective within risk management is called for because it would lead to a multidimensional view [ 37 ] that goes beyond the simplistic explanations provided by the functionalist paradigm.…”
Section: Research Modelmentioning
confidence: 99%
“…Therefore, information security should be treated based on theories that help to understand it from a social perspective, as proposed by Dhillon and Backhouse (2001), Björck (2004Björck ( , 2005, Marciano and Lima-Marques (2006) Albrechtsen (2008) and Coles-Kemp (2009). Besides, the adoption of Information Security measures must be addressed by a theory that considers the influence of external factors, which is consistent with the Institutional Theory (Kam, Katerattanakul, Gogolin, & Hong, 2013), a theoretical approach that is common in studies of social sciences and suggested for studies on Information Security by different authors, such as Björck (2004), Kam et al (2013) and .…”
Section: Information Security Governancementioning
confidence: 99%
“…In order to create this holistic information security framework to accommodate the changing nature of the internet, a diverse, multidisciplinary literature base has been consulted. Only partial framework elements at a non-technical level have been identified such as governance [2], security standards [3], security architecture [4], legal requirements [5], user issues [6], and information security management [7]. The framework presented in this paper addresses this gap in the literature.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A selection of partial non-technical information security frameworks is considered below. A sociotechnical view of information security management is proposed by [2] in which information security is classified as 'an entangled research challenge'. Another theoretical approach is that a set of metrics be developed to measure an organization's security policy [3].…”
Section: Literature Reviewmentioning
confidence: 99%