A design theory for information security awareness
Abstract When implementing their information security solutions organizations have typically focused on technical and procedural security measures. However, from the information systems (IS) point of view, this is not enough: effective IS security requires that users are aware of and use the availa...
Main Author: | |
---|---|
Format: | Doctoral Thesis |
Language: | English |
Published: |
University of Oulu
2006
|
Subjects: | |
Online Access: | http://urn.fi/urn:isbn:9514281144 http://nbn-resolving.de/urn:isbn:9514281144 |
id |
ndltd-oulo.fi-oai-oulu.fi-isbn951-42-8114-4 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-oulo.fi-oai-oulu.fi-isbn951-42-8114-42017-10-14T04:17:43ZA design theory for information security awarenessPuhakainen, P. (Petri)info:eu-repo/semantics/openAccess© University of Oulu, 2006info:eu-repo/semantics/altIdentifier/pissn/0355-3191info:eu-repo/semantics/altIdentifier/eissn/1796-220Xinformation systems securityinformation systems security - awarenessinformation systems security - training Abstract When implementing their information security solutions organizations have typically focused on technical and procedural security measures. However, from the information systems (IS) point of view, this is not enough: effective IS security requires that users are aware of and use the available security measures as described in their organizations' information security policies and instructions. Otherwise, the usefulness of the security measures is lost. The research question of this thesis is to explore how IS users' compliance with IS security policies and instructions can be improved. Solving this research question is divided into two steps. Since there is a lack of a comprehensive review of existing IS security awareness approaches, the first step aims at reviewing the existing IS security awareness approaches. This kind of analysis is useful for practitioners as they do not necessarily have the time to go through a large body of literature. For scholars, such an analysis shows what areas of IS security awareness have been studied, and to where the need for future research is of greatest importance. The second step in this dissertation is to address the shortcomings detected by the analysis by developing three novel design theories for improving IS users' security behavior: (1) IS security awareness training, (2) IS security awareness campaigns, and (3) punishment and reward. These design theories aim to help practitioners to develop their own IS security awareness approaches. Finally, testing of the design theory for IS security awareness training (1) in two action research interventions is described. The results of the interventions suggest that this design theory provides a useful and applicable means for developing a training program in organizations. In addition, the results provide empirically evaluated information regarding the obstacles to user compliance with IS security policies and instructions. In the action research studies described, the goal was to solve practical problems experienced by the host organizations and to understand them and the results achieved from the viewpoint of theory. Consequently, the results as such can not be generalized, but they are of use in the host organizations in planning and delivering subsequent IS security awareness training programs. In addition, the results are utilizable in similar organizations as a point of departure in planning IS security awareness training programs. University of Oulu2006-08-01info:eu-repo/semantics/doctoralThesisinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://urn.fi/urn:isbn:9514281144urn:isbn:9514281144eng |
collection |
NDLTD |
language |
English |
format |
Doctoral Thesis |
sources |
NDLTD |
topic |
information systems security information systems security - awareness information systems security - training |
spellingShingle |
information systems security information systems security - awareness information systems security - training Puhakainen, P. (Petri) A design theory for information security awareness |
description |
Abstract
When implementing their information security solutions organizations have typically focused on technical and procedural security measures. However, from the information systems (IS) point of view, this is not enough: effective IS security requires that users are aware of and use the available security measures as described in their organizations' information security policies and instructions. Otherwise, the usefulness of the security measures is lost.
The research question of this thesis is to explore how IS users' compliance with IS security policies and instructions can be improved. Solving this research question is divided into two steps. Since there is a lack of a comprehensive review of existing IS security awareness approaches, the first step aims at reviewing the existing IS security awareness approaches. This kind of analysis is useful for practitioners as they do not necessarily have the time to go through a large body of literature. For scholars, such an analysis shows what areas of IS security awareness have been studied, and to where the need for future research is of greatest importance.
The second step in this dissertation is to address the shortcomings detected by the analysis by developing three novel design theories for improving IS users' security behavior: (1) IS security awareness training, (2) IS security awareness campaigns, and (3) punishment and reward. These design theories aim to help practitioners to develop their own IS security awareness approaches. Finally, testing of the design theory for IS security awareness training (1) in two action research interventions is described. The results of the interventions suggest that this design theory provides a useful and applicable means for developing a training program in organizations. In addition, the results provide empirically evaluated information regarding the obstacles to user compliance with IS security policies and instructions.
In the action research studies described, the goal was to solve practical problems experienced by the host organizations and to understand them and the results achieved from the viewpoint of theory. Consequently, the results as such can not be generalized, but they are of use in the host organizations in planning and delivering subsequent IS security awareness training programs. In addition, the results are utilizable in similar organizations as a point of departure in planning IS security awareness training programs.
|
author |
Puhakainen, P. (Petri) |
author_facet |
Puhakainen, P. (Petri) |
author_sort |
Puhakainen, P. (Petri) |
title |
A design theory for information security awareness |
title_short |
A design theory for information security awareness |
title_full |
A design theory for information security awareness |
title_fullStr |
A design theory for information security awareness |
title_full_unstemmed |
A design theory for information security awareness |
title_sort |
design theory for information security awareness |
publisher |
University of Oulu |
publishDate |
2006 |
url |
http://urn.fi/urn:isbn:9514281144 http://nbn-resolving.de/urn:isbn:9514281144 |
work_keys_str_mv |
AT puhakainenppetri adesigntheoryforinformationsecurityawareness AT puhakainenppetri designtheoryforinformationsecurityawareness |
_version_ |
1718554682346962944 |