15,238 research outputs found

    Management Perception of Unintentional Information Security Risks

    Get PDF
    This paper will examine the difference between management’s perception of the information security risks and actual information security risks that occur within their organization, arguing that management’s perceptions are based mostly on (1)technology solutions to protect organizational information and (2) their beliefs that employees follow established information security policies. Slovic’s perception of risk theory will be used as a theoretical foundation for this study. The paper will focus on the neglected human element of information security management, with the primary focus on employees’ actions that unintentionally expose organizational information to security risks. These employee actions can threaten information contained within the organization’s computer-based systems as well as information in the form of computer-based system output, such as printed reports, customer receipts, and backup tapes. There has been substantial literature exploring the human threat to organizational information; however past research has focused on intentional behavior, typically referred to as “computer abuse”. Less research has investigated employees’ actions that unintentionally expose an organization to information security risks. Based upon this premise, the purpose of this study is to draw attention to such human threats and in turn shed light on the relationship between unintentional threats caused by employees’ behavior and information security risks. Using a case study conducted in a financial institution, this study investigates these unintentional threats and management’s perception of potential information security risks that these employees’ actions may cause. The research reveals that many of management’s taken-for-granted assumptions about information security within their organization are inaccurate. It is suggested that by increasing management’s awareness of these risks, they will take precautions to eliminate this behavior to ensure that the organization’s information is better secured

    Reve\{a,i\}ling the risks: a phenomenology of information security

    Get PDF
    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, we are able to give a phenomenological explanation of the electronic voting controversy in the Netherlands

    Combatting electoral traces: the Dutch tempest discussion and beyond

    Get PDF
    In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk. In this paper, we use actor-network theory to analyse the socio-technical origins of the Dutch tempest issue in e-voting, and its consequences for e-voting beyond the Netherlands. We introduce the term electoral traces to denote any physical, digital or social evidence of a voter's choices in an election. From this perspective, we provide guidelines for risk analysis as well as an overview of countermeasures
    • …
    corecore