Repository logo
 
Publication

Evaluation of the adoption of an information systems security policy

dc.contributor.authorLopes, Isabel Maria
dc.contributor.authorOliveira, Pedro
dc.date.accessioned2015-07-24T08:53:27Z
dc.date.available2015-07-24T08:53:27Z
dc.date.issued2015
dc.description.abstractInformation Systems Security (ISS) is a relevant fact for current organizations. This paper focuses on Small and Medium Sized Enterprises (SMEs) as although all organizations have their own requirements as far as information security is concerned, SMEs offer one of the most interesting cases for studying the issue of information security policies in particular, and information security in general. Within the organizational universe, SMEs assume a unique relevance due to their high number, which makes information security efficiency a crucial issue. There are several measures which can be implemented in order to ensure the effective protection of information assets, among which the adoption of ISS policies stands out. A recent survey concluded that among 307 SMEs, only 15 indicated to have an ISS policy. The conclusion drawn from that study was that the adoption of ISS policies has not become a reality yet. As an attempt to mitigate this fact, an academic-practitioner collaboration effort was established regarding the implementation of ISS policies in three SMEs. These interventions were conceived as Action Research (AR) projects. This article aims to constitute an empirical study on the applicability of the Action Research method in information systems, more specifically by assessing the adoption of an ISS policy in six SMEs, and identifying the critical success factors in adopting an ISS policy. The research question we intend to answer is to what extent this research method is adequate to reach the proposed goal. The results of the study suggest that AR is a promising means for the evaluation of ISS policies adoption. It can both act as a research method that improves the understanding about the reasons why the policy has been abandoned, for example by the users, and as a change method, assisting practitioners to overcome barriers and suggesting measures to be implemented in order to allow the ISS policy to be properly followed by all the company users on a daily basis.por
dc.identifier.citationLopes, Isabel Maria; Oliveira, P. (2015). Evaluation of the adoption of an information systems security policy. In 10ª Conferência Ibérica de Sistemas e Tecnologias de Informação. Águeda, Portugal. p.665-670. ISBN 978-898-98434-5-5por
dc.identifier.isbn978-898-98434-5-5
dc.identifier.urihttp://hdl.handle.net/10198/11969
dc.language.isoengpor
dc.peerreviewedyespor
dc.subjectAction researchpor
dc.subjectInformation systems securitypor
dc.subjectSmall and medium sized enterprisespor
dc.titleEvaluation of the adoption of an information systems security policypor
dc.typeconference object
dspace.entity.typePublication
oaire.citation.conferencePlaceÁgueda, Portugalpor
oaire.citation.endPage670por
oaire.citation.startPage665por
oaire.citation.title10ª Conferência Ibérica de Sistemas e Tecnologias de Informaçãopor
oaire.citation.volumeIpor
person.familyNameLopes
person.familyNameOliveira
person.givenNameIsabel Maria
person.givenNamePedro
person.identifier.ciencia-id8812-AE1C-A316
person.identifier.orcid0000-0002-5614-3516
person.identifier.orcid0000-0001-8346-1694
person.identifier.ridA-1728-2014
person.identifier.scopus-author-id55211017300
rcaap.rightsopenAccesspor
rcaap.typeconferenceObjectpor
relation.isAuthorOfPublication111716db-94a0-4c24-b739-330dc2ae79fc
relation.isAuthorOfPublicationb2d880bb-278b-489c-aa8f-353cfd99f0fa
relation.isAuthorOfPublication.latestForDiscoveryb2d880bb-278b-489c-aa8f-353cfd99f0fa

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
CISTI 2015 Volume I 665-670.pdf
Size:
4.02 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: