oru.sePublications
3738394041424340 of 116
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Tailoring policies and involving users in constructing security policies: A mapping study
Örebro University, Örebro University School of Business. (CERIS)ORCID iD: 0000-0002-4439-4713
2019 (English)In: Proceeding of the Thirteen International Syposium on Human Aspect of Information Security & Assurance, 2019Conference paper, Published paper (Refereed)
Abstract [en]

The purpose of this study is to survey existing information security policy (ISP) construction research to understand to what extent the concept of tailored ISP and user involvement have been considered by researchers. The results are based on a literature mapping study of ISP construction between 1990 and 2017 in Scopus and Web of Science databases. The findings show that researchers have not given tailoring of ISPs any attention and there are only a few researchers that paid attention to involving users in constructing ISPs. This research has implications for both researchers and practitioners and shows the way for the future researches by focusing on the concept of tailored policy and how it can be achieved as well as involving users in such tailoring.

Place, publisher, year, edition, pages
2019.
Keywords [en]
Information security policy, Policy construction, Tailored policy, User involvement, Mapping study
National Category
Information Systems
Identifiers
URN: urn:nbn:se:oru:diva-75891OAI: oai:DiVA.org:oru-75891DiVA, id: diva2:1345646
Conference
HAISA 2019, Nicosia, Cyprus, 15th - 17th July, 2019
Available from: 2019-08-26 Created: 2019-08-26 Last updated: 2019-08-27Bibliographically approved

Open Access in DiVA

Tailoring policies and involving users in constructing security policies – A mapping study(259 kB)6 downloads
File information
File name FULLTEXT01.pdfFile size 259 kBChecksum SHA-512
69e40271a49d3a485bb0eeaa7544651e6dfa7fd1c97722c11c6aed03ccd0e61649e29eeb67e57ea37175fa04ead4fbf6a1aed12f525b526b90be0e006d4c1c54
Type fulltextMimetype application/pdf

Authority records BETA

Rostami, Elham

Search in DiVA

By author/editor
Rostami, Elham
By organisation
Örebro University School of Business
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 6 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 37 hits
3738394041424340 of 116
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf