Content, Context, Process Analysis of is Security Policy Formation

  • Karyda M
  • Kokolakis S
  • Kiountouzis E
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Security management is now acknowledged as a key constituent of Information Systems (IS) management. IS security management traditionally relies on the formation and application of security policies. Most of the research in this field address issues regarding the structure and content of security policies; whereas the context within which security policies are conceived and developed remains rather unexplored. However, security policies that are formed without taking into account the specific social and organisational environment within which they will he applied, are often proven to he inapplicable or ineffective. In this paper we explore the issues pertaining to the formation of security policies under the perspective of contextualism. Within the framework of contextualism, we study the context, content and process of IS security policies development. This paper aims to contribute to IS security research by bringing forth the issue of context-dependent formation of security policies. In addition, it provides a contextual framework, which we expect to improve the effectiveness of IS security policies development.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Karyda, M., Kokolakis, S., & Kiountouzis, E. (2003). Content, Context, Process Analysis of is Security Policy Formation. In Security and Privacy in the Age of Uncertainty (pp. 145–156). Springer US. https://doi.org/10.1007/978-0-387-35691-4_13

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

60%

Researcher 2

40%

Readers' Discipline

Tooltip

Computer Science 4

80%

Business, Management and Accounting 1

20%

Save time finding and organizing research with Mendeley

Sign up for free