2011
DOI: 10.1080/01972243.2011.607038
|View full text |Cite
|
Sign up to set email alerts
|

The (Social) Construction of Information Security

Abstract: While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes, fences). I argue that this implicit philosophy is unsatisfactory in the current age of increased connectivity, and provide an alternative foundation. I do so from a constructionist point of view, where the coevolution of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
7
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…Contingency theory also affects the initiation and adoption of change in organizations (Battilana & Casciaro, 2012). In information security, both external and internal forces shape what threatens and how to protect information systems (Pieters, 2011). Intertwined in the threat and protection landscape of information systems are people.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Contingency theory also affects the initiation and adoption of change in organizations (Battilana & Casciaro, 2012). In information security, both external and internal forces shape what threatens and how to protect information systems (Pieters, 2011). Intertwined in the threat and protection landscape of information systems are people.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Nonetheless, despite those studies that focus on CIA as the objective of information security and on how they are achieved in practice, information security in and of itself -the question of what it is ontologically -has remained largely unexamined (cf. Pieters, 2011). In this paper, we examine the ontology of information security to depict what information security is and what it does or, rather, to depict what it is through what it does.…”
Section: Introductionmentioning
confidence: 99%
“…This can be seen as a process of alignment of security policies with organisational norms [11], in which the friction between norms and policies is minimised. In general, security requires minimisation of certain frictions and maximisation of others [14,31], of which policy alignment is a typical instance.…”
Section: Adapting the Technologymentioning
confidence: 99%