EconPapers    
Economics at your fingertips  
 

Information Security Culture: Towards an Instrument for Assessing Security Management Practices

Joo S. Lim, Sean B. Maynard, Atif Ahmad and Shanton Chang
Additional contact information
Joo S. Lim: The University of Melbourne, Parkville, Australia
Sean B. Maynard: The University of Melbourne, Parkville, Australia
Atif Ahmad: The University of Melbourne, Parkville, Australia
Shanton Chang: The University of Melbourne, Parkville, Australia

International Journal of Cyber Warfare and Terrorism (IJCWT), 2015, vol. 5, issue 2, 31-52

Abstract: There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instruments of measurement by which organizations can assess their security management practices. The paper identifies nine security practice constructs from the literature and develops measurement items for organizations to assess the adequacy of their security management practices. The study uses a multiple case study approach followed by interviews with a panel of four security experts to validate and refine these security practice constructs and their associated measures.

Date: 2015
References: Add references at CitEc
Citations: Track citations by RSS feed

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJCWT.2015040103 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jcwt00:v:5:y:2015:i:2:p:31-52

Access Statistics for this article

More articles in International Journal of Cyber Warfare and Terrorism (IJCWT) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2019-11-24
Handle: RePEc:igg:jcwt00:v:5:y:2015:i:2:p:31-52