2020
DOI: 10.1016/j.cose.2019.101608
|View full text |Cite
|
Sign up to set email alerts
|

State of the art in information security policy development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
33
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(34 citation statements)
references
References 73 publications
0
33
0
1
Order By: Relevance
“…Senior management teams must deal with the issue of not only fostering security culture, but discovering procedures outside of organisational frameworks that will appreciate the need and use for new policies on security (Marotta and Pearlson, 2019). Most notably, while security policies and related research has existed for decades, there are still ambiguities on how such policies are best developed (Paananen, Lapke and Siponen, 2020). Lacey (2010) (P3) takes this point further, stating that security culture research needs more focus on soft psychology ideals such as change management and education.…”
Section: Open Issues In Cyber Security Culture Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Senior management teams must deal with the issue of not only fostering security culture, but discovering procedures outside of organisational frameworks that will appreciate the need and use for new policies on security (Marotta and Pearlson, 2019). Most notably, while security policies and related research has existed for decades, there are still ambiguities on how such policies are best developed (Paananen, Lapke and Siponen, 2020). Lacey (2010) (P3) takes this point further, stating that security culture research needs more focus on soft psychology ideals such as change management and education.…”
Section: Open Issues In Cyber Security Culture Researchmentioning
confidence: 99%
“…This research is novel as compared to other related security culture reviews (e.g., Glaspie & Karwowski, 2017;Nasir et al, 2019a;Sas et al, 2020) through its combined coverage and analysis of these three areas (instead of disparate studies), meta-analysis of pertinent, recent research (to understand the origins and context of articles published and provide more general insight into the direction of the field), and identification of current outstanding issues as we enter a new decade. We also differentiate our work from other articles focused specifically on security policy compliance (e.g., Bulgurcu, Cavusoglu & Benbasat, 2010;Moody, Siponen & Pahnila, 2018;Cram, D'arcy & Proudfoot, 2019;Paananen, Lapke & Siponen, 2020) as this study aims to be wider in scope, with policies and compliance discussions primarily considered through articles that examine security culture. This is a similar approach to existing culture studies (Nasir et al, 2019a;da Veiga et al, 2020), and is beneficial as it guides our scope and contributions.…”
Section: Introductionmentioning
confidence: 99%
“…Compounding the terminology difficulties, multiple standards/frameworks have been developed and promoted for both ERM and cybersecurity, such as COSO ERM and ISO 31000 for ERM and the ISO/IEC 27000 and NIST CSF for cybersecurity (McShane, 2018; Roy, 2020). Paananen et al (2020) survey the literature on information security plans (ISPs) and find lack of agreement on the definition of ISP and how to develop ISPs. They document a lack of connection between the technical aspect of ISPs and management implications.…”
Section: Future Research: Gaps In Cyber Risk Researchmentioning
confidence: 99%
“…Besides that, the organization also needs to consider the development of Information Security Policy as a subset under IS security governance. Information Security Policy relates to the document(s) governing human activities concerning information security or expressing the information security goals of the organization [29]. This policy will ensure the security of information assets and information technology with a particular process to facilitate the goals and objectives of an organization.…”
Section: Citizen's Acceptancementioning
confidence: 99%