首页 | 本学科首页   官方微博 | 高级检索  
     


Stakeholder perceptions of information security policy: Analyzing personal constructs
Affiliation:1. Panasonic Avionics Corporation, USA;2. The University of North Carolina at Greensboro, USA;3. Princess Nourah Bint Abdulrahman University, Saudi Arabia;1. University of Sussex Business School, University of Sussex, United Kingdom;2. School of Management, Royal Holloway, University of London, United Kingdom;3. Kent Business School, University of Kent, United Kingdom;1. School of Information Management, Central China Normal University, Wuhan 430079, China;2. School of Management, Huazhong University of Science and Technology, Wuhan 430074, China;1. Faculty of Engineering and Information Technology, University of Technology Sydney, Australia;2. Department of Information Systems, College of Business, University of Nevada, Reno, USA
Abstract:Organizational stakeholders, such as employees and security managers, may understand security rules and policies differently. Extant literature suggests that stakeholder perceptions of security policies can contribute to the success or failure of policies. This paper draws on the Theory of Personal Constructs and the associated methodology, the Repertory Grid technique, to capture the convergence and divergence of stakeholder perceptions with regards to security policy. We collected data from the employees of an e-commerce company that had developed five information security sub-policies. Our study highlights the practical utility of the Repertory Grid analysis in helping information security researchers and managers pinpoint a) the aspects of a security policy that are well-received by stakeholders, as well as those that are not, and b) the variance in the perceptions of stakeholders. Organizations can, then, capitalize on the well-received aspects of the policy and take corrective action for the ill-received ones.
Keywords:Information security policy  Repertory grid technique  Theory of personal constructs  Stakeholder perceptions  Security education, training and awareness (SETA)
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号