Project Commitment in the Context of Information Security

نویسندگان

  • Ioannis V. Koskosas
  • Nikolaos Sariannidis
چکیده

This research investigates the role of project commitment in the context of information systems security. In doing so, the research adopts a psychological point of view by exploring and discussing the concept of project commitment in setting information security goals. Information security can be viewed as the efficient control of uncertainty arising from malicious acts intended to exploit valuable assets, and in the context of information systems the valuable assets under consideration are data. Data were collected by using an interpretive approach through in-depth interviews and observation within a single case study in Greece. The contribution of this research to interpretive information-systems consists of the study of project commitment and goal theory in an information security-management context, and its grounding within an interpretive epistemology. Ultimately, this research promotes an interdisciplinary and interorganizational theory that fosters a dialogue transcending industry-specific contexts and explores different management practices that can improve security project commitment and management in its real life context.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey in Project Commitment in the Context of Information Security

The aim of this research is to investigate project commitment in the information systems security context. In doing so, a survey takes place in order to investigate organizational commitment to information security projects within a financial institution. Achieving the required level of information security within organizations usually requires more than security awareness and control but also ...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

E-Banking Security Adoption in the Organizational Context

Although information security is critical for organizations to survive, a number of studies continue to report incidents of critical information loss. To this end, there is a continuous interest to study information security from a non-technical perspective. In doing so, this research focuses on organizational culture and commitment to e-banking security development and management. Even though ...

متن کامل

The role of Real option in e-business Risk management: The case of E-treasury project

Implementing information technology projects requires a calculated process to prevent failure. At the same time application of information technology in organizations faces various potential risks. Exploring information technology environment in organizations reveals the potential risks and provides a structure for comprehensive risk management. There are various methods available for risk mana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJITPM

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2011