Author:
Karlsson Fredrik,Åström Joachim,Karlsson Martin
Abstract
Purpose
– The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about.
Design/methodology/approach
– Results are based on a literature review of information security culture research published between 2000 and 2013 (December).
Findings
– This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature.
Research limitations/implications
– Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research.
Practical implications
– Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated.
Originality/value
– Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference134 articles.
1. Abraham, S.
(2011), “Information security behaviour: factors and research directions”, Americas Conference on Information Systems, AIS Electronic Library (AISeL), Detroit, MI.
2. Acs, Z.J.
and
Gerlowski, D.A.
(1996),
Managerial Economics and Organization
, Prentice Hall, Upper Saddle River, NJ.
3. Ågerfalk, P.J.
(2013), “Embracing diversity through mixed methods research”,
European Journal of Information Systems
, Vol. 22, pp. 251-256.
4. Ajzen, I.
(1991), “The theory of planned behavior”,
Organizational Behavior and Human Decision Processes
, Vol. 50 No. 2, pp. 179-211.
5. Alarifi, A.
,
Tootell, H.
and
Hyland, P.
(2012), “A study of information security awareness and practices in Saudi Arabia”, 2012 International Conference on Communications and Information Technology (ICCIT), IEEE Explore, Hammamet, pp. 6-12.
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献