Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Information security culture – state-of-the-art review between 2000 and 2013
by
Karlsson, Martin
, Åström, Joachim
, Karlsson, Fredrik
in
Academic disciplines
/ Assessments
/ Computer information security
/ Corporate culture
/ Cultural identity
/ Culture
/ Cybersecurity
/ Design engineering
/ Employees
/ Ethnography
/ Informatics
/ Informatik
/ Information
/ Information security
/ information security culture
/ Information systems
/ Information technology
/ Knowledge
/ Knowledge base
/ Knowledge bases (artificial intelligence)
/ literature review
/ Literature reviews
/ Research methodology
/ Security
/ Security management
/ State of the art
/ State-of-the-art reviews
2015
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Information security culture – state-of-the-art review between 2000 and 2013
by
Karlsson, Martin
, Åström, Joachim
, Karlsson, Fredrik
in
Academic disciplines
/ Assessments
/ Computer information security
/ Corporate culture
/ Cultural identity
/ Culture
/ Cybersecurity
/ Design engineering
/ Employees
/ Ethnography
/ Informatics
/ Informatik
/ Information
/ Information security
/ information security culture
/ Information systems
/ Information technology
/ Knowledge
/ Knowledge base
/ Knowledge bases (artificial intelligence)
/ literature review
/ Literature reviews
/ Research methodology
/ Security
/ Security management
/ State of the art
/ State-of-the-art reviews
2015
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Information security culture – state-of-the-art review between 2000 and 2013
by
Karlsson, Martin
, Åström, Joachim
, Karlsson, Fredrik
in
Academic disciplines
/ Assessments
/ Computer information security
/ Corporate culture
/ Cultural identity
/ Culture
/ Cybersecurity
/ Design engineering
/ Employees
/ Ethnography
/ Informatics
/ Informatik
/ Information
/ Information security
/ information security culture
/ Information systems
/ Information technology
/ Knowledge
/ Knowledge base
/ Knowledge bases (artificial intelligence)
/ literature review
/ Literature reviews
/ Research methodology
/ Security
/ Security management
/ State of the art
/ State-of-the-art reviews
2015
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Information security culture – state-of-the-art review between 2000 and 2013
Journal Article
Information security culture – state-of-the-art review between 2000 and 2013
2015
Request Book From Autostore
and Choose the Collection Method
Overview
Purpose – The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about. Design/methodology/approach – Results are based on a literature review of information security culture research published between 2000 and 2013 (December). Findings – This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature. Research limitations/implications – Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research. Practical implications – Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated. Originality/value – Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security.
Publisher
Emerald Group Publishing Limited
This website uses cookies to ensure you get the best experience on our website.