“…To overcome this weakness, several IS security methods have been proposed (Baskerville 1993, Dhillon & Backhouse 2001, Dhillon 1997, Siponen, 2001. Of these methods, security checklists and management standards (classified as normative management-oriented security standards) are widely used (Parker 1998, Eloff & Solms 2000a, b, Solms & Haar 2000. In fact, IS security journals, including Computers & Security, Information Systems Security, Information Management & Computer Security, and information security management conference proceedings (e.g., annual IFIP TC11), are saturated with articles by security practitioners and academics paying lip service to the various existing standards; see, for example, Eloff and Solms (2000b), Ferris (1994), Ferraiolo and Sachs (1996), Fitzgerald (1995), Hardy (1995), Hopkinson (2001), Pounder (1999) and Solms (1996Solms ( , 1998Solms ( , 1999.…”