2017
DOI: 10.1108/ics-07-2016-0053
|View full text |Cite
|
Sign up to set email alerts
|

Analysing information security in a bank using soft systems methodology

Abstract: Purpose -This paper explores the use of Soft Systems Methodology (SSM) to analyse the sociotechnical information security issues in a major bank.Design/methodology/approach -Case study research was conducted on a major bank. Semistructured interviews with a purposive sample of key stakeholders in the business, comprising senior managers, security professionals and branch employees were conducted.Findings -SSM was particularly useful for exploring the holistic information security issues, enabling models to be … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…This methodology encompasses key elements in the study of systems and has been addressed in numerous scientific articles [27][28][29][30]. The SSM is particularly useful for capturing the systemic complexities within an organization [31,32]. The SSM has two phases, which group seven elements.…”
Section: Methodsmentioning
confidence: 99%
“…This methodology encompasses key elements in the study of systems and has been addressed in numerous scientific articles [27][28][29][30]. The SSM is particularly useful for capturing the systemic complexities within an organization [31,32]. The SSM has two phases, which group seven elements.…”
Section: Methodsmentioning
confidence: 99%
“…In the above equation, M stands for plaintext, C stands for ciphertext, K stands for the secret key used in the encryption and decryption process, E stands for encryption transformation, and D stands for decryption transformation. Symmetric key algorithms can be divided into two categories: sequence ciphers and block ciphers [10,11].…”
Section: Secret Key Encryptionmentioning
confidence: 99%
“…ISG approaches that ignore the human and individual levels often have little bearing on the organisations’ objectives (Mishra, 2015). To this extent, researchers highlight the importance of achieving a supportive security culture, combining corporate governance and information security, as this approach takes into account the complex socio-technical system (Thomson and Von Solms, 2005; Veiga and Eloff, 2007; Ruighaver et al , 2007; Flores et al , 2014; Damenu and Beaumont, 2017).…”
Section: Definitions Perspectives and Modelsmentioning
confidence: 99%
“…IS scholars widely believe that senior executive and board commitment is critical for effective ISG (Veiga and Eloff, 2007; Mukundan and Sai, 2014; Barton et al , 2016; Damenu and Beaumont, 2017). Fortunately, the staggering number of IS breaches (see introduction) has made executives and boards more aware of the need to protect the business and their corporate information assets (Kayworth and Whitten, 2012; Georg, 2017; Von Solms and Von Solms, 2018).…”
Section: Tensions “From the Basement To The Boardroom” In A Digital Eramentioning
confidence: 99%