Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Organizational Behavior and Theory

Selected Works

Information security

Articles 1 - 3 of 3

Full-Text Articles in Business

The Roles Of Positive And Negative Exemplars In Information Security Strategy, Richard Taylor Dec 2013

The Roles Of Positive And Negative Exemplars In Information Security Strategy, Richard Taylor

Richard Taylor

The strategic approach used to manage organizational security is strongly influenced by
management’s perception of risk. These perceptions often lead executives to focus on the use of
technology based solutions. Such solutions, aimed primarily at keeping data safe from outsiders,
overlook the potential that more severe security breaches may be perpetrated by trusted insiders.
Behavioral concepts such as ethnocentrism, group membership and intergroup bias, form the
basis of an investigation that is aimed at developing our understanding of information security as
a social issue. This paper considers the influence of in-group trust and out-group distrust, and the
potential impact that …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko Jul 2012

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko

Humayun Zafar

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …