4.5 Article

Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis

期刊

COMPUTERS & SECURITY
卷 114, 期 -, 页码 -

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2021.102578

关键词

Information security management; Information security policy; Compliance; Computerized support; Value-based compliance

资金

  1. Swedish Civil Contingencies Agency [2018-13755]

向作者/读者索取更多资源

There is a risk of noncompliance with information security policies when end users have to prioritize between different rationalities in organizations. The purpose of this paper is to elicit a set of requirements for computerized software that support analysis of competing rationalities in relation to end users' compliance and non-compliance with information security policies.
When end users have to prioritize between different rationalities in organisations there is a risk of noncompliance with information security policies. Thus, in order for information security managers to align information security with the organisations' core work practices, they need to understand the competing rationalities. The Value-based compliance (VBC) analysis method has been suggested to this end, however it has proven to be complex and time-consuming. Computerized software may aid this type of analysis and make it more efficient and executable. The purpose of this paper is to elicit a set of requirements for computerized software that support analysis of competing rationalities in relation to end users' compliance and non-compliance with information security policies. We employed a design science research approach, drawing on design knowledge on VBC and elicited 17 user stories. These requirements can direct future research efforts to develop computerized software in this area. (C) 2021 The Authors. Published by Elsevier Ltd.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据