2015
DOI: 10.1108/ics-05-2014-0033
|View full text |Cite
|
Sign up to set email alerts
|

Information security culture – state-of-the-art review between 2000 and 2013

Abstract: Purpose – The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about. Design/methodology/approach – Results are based on a literature review of information security culture research published between 2000 and 2013 (December). Findings – This… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
44
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(46 citation statements)
references
References 81 publications
2
44
0
Order By: Relevance
“…If focus groups or interviews are conducted, the method could extend to an inductive method. 978-1-4673-8460-5/16/$31.00 ©2016 IEEE • Strategy: Quantitative research methods have been used with great success in the information security discipline [2,29,50]. One of the benefits of using a quantitative approach is that specific areas of concern (e.g.…”
Section: B Research Philosophy Of and Approach To Cybersecurity Culturementioning
confidence: 99%
See 1 more Smart Citation
“…If focus groups or interviews are conducted, the method could extend to an inductive method. 978-1-4673-8460-5/16/$31.00 ©2016 IEEE • Strategy: Quantitative research methods have been used with great success in the information security discipline [2,29,50]. One of the benefits of using a quantitative approach is that specific areas of concern (e.g.…”
Section: B Research Philosophy Of and Approach To Cybersecurity Culturementioning
confidence: 99%
“…• Factor A -20 statements: 49,55,50,54,62,35,61,58,57,28,60,22,56,24,66,64,42,21,47,32 • Factor B -13 statements: 44,43,30,36,45,29,34,38,46,53,19,27,52 • Factor C -5 statements: 26, 23, 39, 31, 33…”
Section: ) Confirm Validity Of the Questionnairementioning
confidence: 99%
“…For example, in [10] it is argued that information security obedience (i.e., compliance with policies) binds together information security, corporate governance and corporate culture and in [11] "culture" is described as the ideal state of "compliance. The most frequently cited their theoretical frameworks in r research on information security culture [12] are those of Edgar Schein and Geert Hofstede. Schein's framework is a three-tiered model that explains organizational culture on the levels of shared basic assumptions, espoused values and artifacts/behaviors [13].…”
Section: Information Security Culturementioning
confidence: 99%
“…It is discussed in the next section. Karlsson et al's (2015) systematic review of information security culture research identifies that almost 40 percent of the papers are theoretical and do not include empirical data. Unlike those papers, this research is based on empirical data and it is conducted with a qualitative interpretivist approach using an embedded single case study methodology.…”
Section: Summary: Analysing Socio-technical Aspects Of Securitymentioning
confidence: 99%
“…Unfortunately, most research has focussed on technology and more work is required on the sociotechnical aspects of information security (Hagen, Albrechtsen, & Hovden, 2008) In response to this need to focus on the socio-technical threats, and Karlsson et al's (2015) exhortation for more empirical and in-depth research, this paper presents a case study of a major bank in a developing economy. Since global finance is highly interconnected, it is important that banks in such economies do not comprise a weak link and hence results from this case have value for the industry as a whole.…”
Section: Introductionmentioning
confidence: 99%