216 research outputs found

    Information Systems Security Policy Violation: Systematic Literature Review on Behavior Threats by Internal Agents

    Get PDF
    Systematic literature review (SLR) addresses the question of structured literature searches when dealing with a potentially large number of literature sources. An example of a large number of literature sources where SLR would be beneficial can be found in the Information systems security literature which touches on internal agents’ behavior and tendencies to violate security policies. Upon close examination, very few studies have used SLR in the work. This work presents an insightful approach to how SLR may be applicable in the domain of Information Systems security. The article presents a summary of the SLR approach contextualized in the domain of IS security in order to address such a gap. Rigor and relevance is systematized in the work through a pre-selection and coding of literature using Atlas.ti. The outcome of the SLR process outlined in this work is a presentation of literature in three pre-determined schemes namely, the theories that have been used in information systems security violations literature, categorization of security violations as presented in literature; and the contexts that these violations occur. The work concludes by presenting suggestions for future research

    Understanding internal information systems security policy violations as paradoxes

    Get PDF
    Abstract: Violation of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of; belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs

    The enemy has passed through the gate: insider threats, the dark triad, and the challenges around security

    Get PDF
    Purpose – The purpose of this paper is to highlight the potential role that the so-called “toxic triangle” (Padilla et al., 2007) can play in undermining the processes around effectiveness. It is the interaction between leaders, organisational members, and the environmental context in which those interactions occur that has the potential to generate dysfunctional behaviours and processes. The paper seeks to set out a set of issues that would seem to be worthy of further consideration within the Journal and which deal with the relationships between organisational effectiveness and the threats from insiders.<p></p> Design/methodology/approach – The paper adopts a systems approach to the threats from insiders and the manner in which it impacts on organisation effectiveness. The ultimate goal of the paper is to stimulate further debate and discussion around the issues.<p></p> Findings – The paper adds to the discussions around effectiveness by highlighting how senior managers can create the conditions in which failure can occur through the erosion of controls, poor decision making, and the creation of a culture that has the potential to generate failure. Within this setting, insiders can serve to trigger a series of failures by their actions and for which the controls in place are either ineffective or have been by-passed as a result of insider knowledge.<p></p> Research limitations/implications – The issues raised in this paper need to be tested empirically as a means of providing a clear evidence base in support of their relationships with the generation of organisational ineffectiveness.<p></p> Practical implications – The paper aims to raise awareness and stimulate thinking by practising managers around the role that the “toxic triangle” of issues can play in creating the conditions by which organisations can incubate the potential for crisis.<p></p> Originality/value – The paper seeks to bring together a disparate body of published work within the context of “organisational effectiveness” and sets out a series of dark characteristics that organisations need to consider if they are to avoid failure. The paper argues the case that effectiveness can be a fragile construct and that the mechanisms that generate failure also need to be actively considered when discussing what effectiveness means in practice.<p></p&gt

    The Extended Corporate Mind: When Corporations Use AI to Break the Law

    Get PDF

    Vermin, victims and disease: British debates over bovine tuberculosis and badgers

    Get PDF
    This is the final version. Available on open access from Palgrave Macmillan via the DOI in this recordThis open access book provides the first critical history of the controversy over whether to cull wild badgers to control the spread of bovine tuberculosis (bTB) in British cattle. This question has plagued several professional generations of politicians, policymakers, experts and campaigners since the early 1970s. Questions of what is known, who knows, who cares, who to trust and what to do about this complex problem have been the source of scientific, policy, and increasingly vociferous public debate ever since. This book integrates contemporary history, science and technology studies, human-animal relations, and policy research to conduct a cross-cutting analysis of the situation. It explores the worldviews of those involved with animal health, disease ecology and badger protection between the 1970s and 1990s, before reintegrating them to investigate the recent public polarisation of the controversy. Finally it asks how we might move beyond the current impasse to explore more open and sustainable approaches to the situation.Wellcome Trus

    “They’re all little boys who need a strong mommy:” Burke’s Theories of Form and Terministic Screens Concerning Maternal Representations in \u3ci\u3eSons of Anarchy\u3c/i\u3e

    Get PDF
    This thesis aims to analyze one contemporary television series’ representations of mothers and what these depictions say about the trajectory of cultural perceptions. As one of the most pervasive forms of media in contemporary culture, television offers an opportune site of study about what American society deems important. While many scholars have begun exploring issues concerning gender on television, few have focused primarily on depictions of motherhood and their implications on society. Televised representations of mothers have traditionally remained in the background of shows, spending the majority of their screen time taking care of their children, husbands, and households in general. Today, however, maternal characters are beginning to push the typical boundaries, potentially signifying a shift in cultural perception of mothers. When conducting this analysis I utilize Kenneth Burke’s theories of form and terministic screens to examine the ways in which the current television series Sons of Anarchy both reifies and reinscribes dominant ideology through the arrangement of revealing and concealing images to both create and satisfy audience desires. Analyzing the organization of these maternal characters ultimately establishes that Sons of Anarchy essentially furthers culturally created expectations of motherhood while intermittently complicating this image of the mother

    Vermin, Victims and Disease

    Get PDF
    This open access book provides the first critical history of the controversy over whether to cull wild badgers to control the spread of bovine tuberculosis (bTB) in British cattle. This question has plagued several professional generations of politicians, policymakers, experts and campaigners since the early 1970s. Questions of what is known, who knows, who cares, who to trust and what to do about this complex problem have been the source of scientific, policy, and increasingly vociferous public debate ever since. This book integrates contemporary history, science and technology studies, human-animal relations, and policy research to conduct a cross-cutting analysis. It explores the worldviews of those involved with animal health, disease ecology and badger protection between the 1970s and 1990s, before reintegrating them to investigate the recent public polarisation of the controversy. Finally it asks how we might move beyond the current impasse

    Ferocious Logics

    Get PDF
    Contemporary power manifests in the algorithmic. And yet this power seems incomprehensible: understood as code, it becomes apolitical; understood as a totality, it becomes overwhelming. This book takes an alternate approach, using it to unravel the operations of Uber and Palantir, Airbnb and Amazon Alexa. Moving off the whiteboard and into the world, the algorithmic must negotiate with frictions—the ‘merely’ technical routines of distributing data and running tasks coming together into broader social forces that shape subjectivities, steer bodies, and calibrate relationships. Driven by the imperatives of capital, the algorithmic exhausts subjects and spaces, a double move seeking to both exhaustively apprehend them and exhaust away their productivities. But these on-the-ground encounters also reveal that force is never guaranteed. The irreducibility of the world renders logic inadequate and control gives way to contingency

    Ferocious Logics: Unmaking the Algorithm

    Get PDF
    Contemporary power manifests in the algorithmic. And yet this power seems incomprehensible: understood as code, it becomes apolitical; understood as a totality, it becomes overwhelming. This book takes an alternate approach, using it to unravel the operations of Uber and Palantir, Airbnb and Amazon Alexa. Moving off the whiteboard and into the world, the algorithmic must negotiate with frictions - the 'merely' technical routines of distributing data and running tasks coming together into broader social forces that shape subjectivities, steer bodies, and calibrate relationships. Driven by the imperatives of capital, the algorithmic exhausts subjects and spaces, a double move seeking to both exhaustively apprehend them and exhaust away their productivities. But these on-the-ground encounters also reveal that force is never guaranteed. The irreducibility of the world renders logic inadequate and control gives way to contingency

    Bodies of executive citizenship: embodied rhetorical performances of the presidency from Reagan to Obama

    Get PDF
    This dissertation contributes to the recent resurgence of scholarship devoted to the American presidency by arguing that the role of the presidential body works as a singularly significant crucial point for notions of citizenship and national identity. Addressing presidential bodies as texts shows that the singularity of the presidential body positions it as a dense site of affect and identification that allows for leadership and the organization of politics to work through the management of emotions. In particular, the emergence of television allows presidents to embody sovereign power in ways that both sentimentalize it and separate the performance of singular, model citizenship from populations more or less abandoned as not-quite-national subjects. By exploring how media imagine the chief executive and how presidents represent themselves on television, in speeches, and in campaign documentaries, I identify national scripts that constitute executive citizenship, a concept I develop and see as crucial to the management of public and private life. By highlighting the fundamental role executive performances play in constructing an image of national citizenship and shaping feelings of belonging, I challenge traditional narratives that figure citizenship in the U.S. as natural rather than deliberately constructed through rhetoric and language
    corecore