Abstract
PurposeThis paper aims to understand how managers of IT and information security aim to enhance information security and business continuity management in interorganizational IT relationships, such as outsourcing, cloud computing and interorganizational systems.Design/methodology/approachAn explorative study of large multinational or local organizations operating in Finland was conducted. In total, 18 IT and information security managers were interviewed with semi‐structured questions.FindingsFirst, the author discovered that several methods such as contracts, audits and standards were applied to balance power relationships between organizations or transfer responsibilities to other parties. The objectives of these methods are different within organizations. Second, the paper presents a comprehensive view of different security and continuity solutions in interorganizational IT relationships. The findings have practical value for IT managers and information security experts.Research limitations/implicationsThe interviews were conducted in different organizations. Therefore, it is suggested that a single in‐depth study that examines the phenomenon on different organizational levels within one organization would supplement the findings. Further studies on the power, trust and control balance of interorganizational IT relationships are required.Originality/valueThis paper builds on and expands information security and business continuity literature by illustrating that audits and standards play different roles in interorganizational IT relationships within organizations, and that contracts form the basis of those relationships. Information security problems and business continuity breaches caused by external partners and outsourcing vendors affect the reputation and value of the client company. Therefore, managers must have the means to ensure the continuity of operations.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference52 articles.
1. Albrechtsen, E. and Hovden, J. (2009), “The information security digital divide between information security managers and users”, Computers & Security, Vol. 28 No. 6, pp. 476‐90.
2. Ali, M., Kurnia, S. and Johnston, R.B. (2008), “Dyadic model of interorganizational systems (IOS) adoption maturity”, Proceedings of the 41st Annual Hawaii International Conference on System Sciences, IEEE, Waikoloa, HI, USA, p. 8.
3. Bayuk, J. (2009), Enterprise Security for the Executive: Setting the Tone from the Top, Praeger Publishers, Santa Barbara, CA.
4. Butler, B.S. and Gray, P.H. (2006), “Reliability, mindfulness, and information systems”, MIS Quarterly, Vol. 30 No. 2, p. 211.
5. Cerullo, V. and Cerullo, M.J. (2004), “Business continuity planning: a comprehensive approach”, Information Systems Management, Vol. 21 No. 3, pp. 70‐8.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献