2017
DOI: 10.1057/s41303-016-0025-y
|View full text |Cite
|
Sign up to set email alerts
|

Information systems security policy implementation in practice: from best practices to situated practices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
42
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(48 citation statements)
references
References 77 publications
2
42
0
Order By: Relevance
“…Chen & Zahedi, 2016), which has resulted in various design theories (Heikka, Baskerville, & Siponen, 2006;Siponen & Iivari, 2006). A key research focus in the area of IS security is the use of organizational policies that define how the users of information systems should prevent, identify, and react in security incidents (Anderson et al, 2017;Cram, Proudfoot, & D'Arcy, 2017;Moody, Siponen, & Pahnila, 2018;Niemimaa & Niemimaa, 2017). An excellent review of the body of knowledge is provided by Cram et al (2017), who analyzed 114 security policy-related journal articles.…”
Section: Existing Research On Sdpss and Their Limitationsmentioning
confidence: 99%
“…Chen & Zahedi, 2016), which has resulted in various design theories (Heikka, Baskerville, & Siponen, 2006;Siponen & Iivari, 2006). A key research focus in the area of IS security is the use of organizational policies that define how the users of information systems should prevent, identify, and react in security incidents (Anderson et al, 2017;Cram, Proudfoot, & D'Arcy, 2017;Moody, Siponen, & Pahnila, 2018;Niemimaa & Niemimaa, 2017). An excellent review of the body of knowledge is provided by Cram et al (2017), who analyzed 114 security policy-related journal articles.…”
Section: Existing Research On Sdpss and Their Limitationsmentioning
confidence: 99%
“…On the other hand, employees lack basic information on security knowledge and are thus unarmed when addressing information security risks. As a result, employees' violations of ISP or the abuse or misuse of work computers frequently occurs within organizations (Niemimaa & Niemimaa, 2017). To this end, information security management at the organizational level should focus on cultivating employees' information security awareness and improving the self-efficacy level (Posey et al, 2013;Moody et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…will they be fully effective. Niemimaa and Niemimaa (2017) studied how an information technology service provider translated the information systems security (ISS) best practice of information classification into an ISS policy and into situated practices. As found in the study of the Norwegian electricity power supply sector, they note that the international ISS standards, such as ISO/IEC 27001 and ISO/IEC 27002, are universal and general in their scope and provide little guidance for the organizations that wish to adopt them (Siponen, 2006;Siponen and Wilson, 2009).…”
Section: Discussionmentioning
confidence: 99%
“…According to Ansari, Fiss, and Zajac (2010), transfer and diffusion of practices among different local contexts consist of translation, coconstruction, and editing activities in different cultural and social contexts and may lead to divergence and variability in practices that are being adopted, enacted, and adapted. Niemimaa and Niemimaa (2017) have also found that practices across organizations may not emerge as identical simply by following the same set of best practices. On an abstract level, it may be possible to identify common characteristics of practices across organizations.…”
Section: Sensemaking and Translation Theorymentioning
confidence: 99%