2010
DOI: 10.1108/09685221011035223
|View full text |Cite
|
Sign up to set email alerts
|

Understanding and transforming organizational security culture

Abstract: PurposeThe purpose of this paper is to examine the practical issues, techniques and learning points associated with information security awareness and organizational change programmes.Design/methodology/approachThe paper is based on the findings and conclusions of research, observations and projects carried out in large organizations over the last two decades. It highlights failings and critical success factors in contemporary approaches to transform organizational culture. It draws on theory and research from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
1
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(57 citation statements)
references
References 1 publication
0
55
1
1
Order By: Relevance
“…This finding should bring the focus of organizations towards effectively shaping their employees" attitudes and preventing inappropriate behaviors against IS security policy. As such, security awareness programs [107][108][109] form one of the many approaches available for organizations to influence their employees" attitudinal belief, which in essence influences attitude.…”
Section: Resultsmentioning
confidence: 99%
“…This finding should bring the focus of organizations towards effectively shaping their employees" attitudes and preventing inappropriate behaviors against IS security policy. As such, security awareness programs [107][108][109] form one of the many approaches available for organizations to influence their employees" attitudinal belief, which in essence influences attitude.…”
Section: Resultsmentioning
confidence: 99%
“…Examples of human error include forgetting to change passwords, not logging off before leaving a workstation, or careless discarding of sensitive information (Warkentin & Willison, 2009). Case studies, scenario planning, and crisis exercises are used to create awareness, and are an effective means of changing organizational security culture (Hagen, Albrechtsen, & Hovden, 2008;Lacey, 2010). According to Johnson (2006), benefits from awareness programs mitigate overall security risks, increase reliability and correctness of information, and result in early detection of potential security incidents.…”
Section: Trainingmentioning
confidence: 99%
“…The technology is often expensive or difficult to manage, and quickly becomes outdated, but the most critical aspect could be the people we often leave behind from the equation when pursuing methods to manage our sensitive information. Yet, managing sensitive information cannot be completed through a focus on only policies, processes, and technology, but also requires a change in employee awareness, attitude, and behavior (Lacey, 2010). …”
Section: Literature Reviewmentioning
confidence: 98%
“…When sensitive information is breached, we need to stop and think before reacting, as often "the best performers make the most serious and glaring mistakes because they work harder, faster and are more empowered. The logical response to a major breach is to investigate what went wrong, rather than who is to blame" (Lacey, 2010). Thus, a holistic approach in the implementation of an information security program is often recommended.…”
Section: Literature Reviewmentioning
confidence: 99%