...
首页> 外文期刊>The data base for advances in information systems >Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory
【24h】

Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory

机译:审查IS安全策略合规性:迈向IS安全理论的基础

获取原文
获取原文并翻译 | 示例
           

摘要

An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent and malicious insiders. We begin by defining the terms, developing a new taxonomy of insiders, and then providing a comprehensive review of articles on IS policy compliance for the past 26 years. Grounding the analysis in the literature, we-inductively identify four themes to foster Information Security policy compliance among employees. The themes are: 1) IS management philosophy, 2) procedural countermeasures, 3) technical countermeasures, and 4) environmental countermeasures. We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory.
机译:了解信息系统(IS)中的内部威胁对于帮助解决组织内部潜伏的危险之一很重要。本文提供了有关信息系统政策的内部人遵从性(以及遵从性失败)文献的综述,以了解有关过失和恶意内部人的信息系统研究的现状。我们首先定义术语,开发内部人员的新分类法,然后对过去26年中有关IS政策合规性的文章进行全面回顾。基于文献中的分析,我们归纳地确定了四个主题以促进员工之间的信息安全策略合规性。主题是:1)IS管理理念,2)程序对策,3)技术对策和4)环境对策。我们建议未来的研究可以利用这些主题,并将其用作本地IS安全理论的基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号