Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 2019
DOI: 10.1145/3290605.3300663
|View full text |Cite
|
Sign up to set email alerts
|

Security Managers Are Not The Enemy Either

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…Our work contributes to and extends existing, albeit limited, scholarship which has explored cyber security within organisations, e.g. [42,50,62,88,69,99,108], and an even smaller number focusing on CISOs, e.g., [13,91]. We do so by studying the role and identity of the CISO as critical to the organisational cyber-security function and by bringing it into conversation with wider security scholarship related to ontological security and sociological notions of identity work, through a theoretically grounded interpretative analysis.…”
Section: Introductionmentioning
confidence: 77%
See 2 more Smart Citations
“…Our work contributes to and extends existing, albeit limited, scholarship which has explored cyber security within organisations, e.g. [42,50,62,88,69,99,108], and an even smaller number focusing on CISOs, e.g., [13,91]. We do so by studying the role and identity of the CISO as critical to the organisational cyber-security function and by bringing it into conversation with wider security scholarship related to ontological security and sociological notions of identity work, through a theoretically grounded interpretative analysis.…”
Section: Introductionmentioning
confidence: 77%
“…Their study showed that cyber security is inherently collaborative both within and across organisational settings -while also being grounded in a community of experts. Effective cyber security depends on multiple actors, not just those who are cyber-security practitioners [91]. However, a number of studies highlight that CISOs appear be somewhat disconnected from the rest of their organisations, being seen as blockers [13], governors [91,66], translators [58], or even adversaries [12].…”
Section: Cisosmentioning
confidence: 99%
See 1 more Smart Citation
“…Security managers cannot be assumed to have in-depth knowledge of the human aspects of security, but may nonetheless value it in security policy decision-making [45]. They then require methods and tools to do so [51].…”
Section: Future Directionsmentioning
confidence: 99%
“…Engagement with cyber security experts [121] has, for instance, identified expectations for top user behaviours (highlighting also that even the experts cannot necessarily agree on how users should be supported and protected). Interviews with organisational security managers [122] has identified that they can appreciate the link between security controls and impacts upon user tasks and priorities; in other cases, it has also identified that security managers themselves need tools to be able to consider the impacts that their risk management strategies have upon users [123].…”
Section: Related Workmentioning
confidence: 99%