The influence of inputs in the information security policy development: an institutional perspective

Author:

Ording Lovisa Göransson,Gao Shang,Chen Weifeng

Abstract

Purpose The purpose of this paper is to investigate what role literature-based inputs have on the information security policy (ISP) development in practice. Design/methodology/approach A literature review is carried out to identify commonly used inputs for ISP development in theory firstly. Secondly, through the lens of institutional theory, an interpretive approach is adapted to study the influence of literature-based inputs in the ISP development in practice. Semi-structured interviews with senior experienced information security officers and managers from the public sector in Sweden are carried out for this research. Findings According to the literature review, 10 inputs for ISP development have been identified. The results from the interviews indicate that the role inputs have on the ISP development serves as more than a rational tool, where organisational context, institutional pressures and the search for legitimacy play an important role. Research limitations/implications From the institutional perspective, this study signifies the influence of inputs on ISP development can be derived from institutionalised rules or practices established by higher authorities; actions and practices that are perceived as successful and often used by other organisations; the beliefs of what is viewed as appropriate to meet the specific pressures from stakeholders. Practical implications This research recommends five practical implications for practitioners working with the ISP development. These recommendations aim to create an understanding of how an ISP could be developed, considering more than the rational functionalist perspective. Originality/value To the best of the authors’ knowledge, it is the first of its kind in examining the role of literature-based inputs in ISP development in practice through the lens of institutional theory.

Publisher

Emerald

Subject

Information Systems and Management,Computer Science Applications,Public Administration

Reference47 articles.

1. E‐government adoption in Oman: motivating factors from a government perspective;Transforming Government: People, Process and Policy,2013

2. Bayuk, J. (2009), “How to write an information security policy”, Computerworld, available at; www.computerworld.com/article/2525539/how-to-write-an-information-security-policy.html

3. Business Research Methods,2018

4. Bjorck, F. (2004), “Institutional theory: a new perspective for research into is/IT security in organisations”, Paper presented at the Proceedings of the 37th Annual HI International Conference on System Sciences, 2004, Big Island, HI.

5. Institutional pressures in security management: direct and indirect influences on organizational investment in information security control resources;Information and Management,2015

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Privacy of Information and Data;Advances in Information Quality and Management;2024-03-29

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3