2009
DOI: 10.1016/j.cose.2009.01.003
|View full text |Cite
|
Sign up to set email alerts
|

The information security digital divide between information security managers and users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
69
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 104 publications
(75 citation statements)
references
References 24 publications
1
69
0
Order By: Relevance
“…Previous research indicated that the slight response rate which uncovered that the main reasons that the related information security is regarded as confidentiality and the policy of information secrecy is implemented extensively in enterprise. These above-mentioned actualities, the sufficient quantity of received survey is more arduous, hence, the amount of received survey in information security research generally are slighter than other research issues (Albrechtsen & Hovden, 2009;Department of Trade & Industry, 2004;Kotulic & Clark, 2004;Vance, Siponen, & Pahnila, 2012). On the other hand, the majority of studies on computer virus propagation published in the IS security literature a technical perspective and lack of management perspectives.…”
Section: Introductionmentioning
confidence: 99%
“…Previous research indicated that the slight response rate which uncovered that the main reasons that the related information security is regarded as confidentiality and the policy of information secrecy is implemented extensively in enterprise. These above-mentioned actualities, the sufficient quantity of received survey is more arduous, hence, the amount of received survey in information security research generally are slighter than other research issues (Albrechtsen & Hovden, 2009;Department of Trade & Industry, 2004;Kotulic & Clark, 2004;Vance, Siponen, & Pahnila, 2012). On the other hand, the majority of studies on computer virus propagation published in the IS security literature a technical perspective and lack of management perspectives.…”
Section: Introductionmentioning
confidence: 99%
“…Employees who are frustrated with high security overhead and do not feel trusted are likely to develop a negative attitude towards security. This leads to the creation of a value gap between security and production parts of an organization, and reduces employee's willingness to collaborate to keep the organization secure [28]. When that negative attitude becomes prominent, it leads to widespread non-compliance [32], insider attacks [14] and valuable employees that feel untrusted leaving organization (loss of human capital) [29].…”
Section: Enforcement Leads To Distrustmentioning
confidence: 99%
“…We regard the lack of sufficient consideration of the current practice in the design and implementation of ISSPs as a considerable shortcoming, especially in light of the central role that ISSPs play in managing the users' ISS behaviors. ISSPs are often expressions of management's values and beliefs about how to manage ISS in the organization [8] while employees' behaviors are often anchored in deeply held values and beliefs often related to their profession and work practices [9,10]. Previous research shows that tensions and value conflicts are a natural part of ISS management [9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…ISSPs are often expressions of management's values and beliefs about how to manage ISS in the organization [8] while employees' behaviors are often anchored in deeply held values and beliefs often related to their profession and work practices [9,10]. Previous research shows that tensions and value conflicts are a natural part of ISS management [9][10][11]. We claim that the current limited focus on changing users' values do not consider the complexity of ISS management and practice where different groups and collaborating actors adhere to different and sometimes even conflicting values.…”
Section: Introductionmentioning
confidence: 99%