Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Business
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …
An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko
An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko
Humayun Zafar
In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …
Leadership And The Psychology Of Awareness: Three Theoretical Approaches To Information Security Management, Robert Holmberg, Mikael Sundstrom
Leadership And The Psychology Of Awareness: Three Theoretical Approaches To Information Security Management, Robert Holmberg, Mikael Sundstrom
Organization Management Journal
The authors argue that information security management (ISM) would benefit from studies that examine the social and psychological mechanisms that, when in evidence, generate employee awareness of information security (IS)-related issues. Properly instilled, IS awareness has the power to engender a proactive wariness beyond mechanical guidelines, however detailed. To study how awareness travels in complex organizations, the authors devise a framework to catch mechanisms grounded in psychological and sociological theories. To illustrate the framework, the authors then turn to an empirical study of a medium-sized company where they sound out managers for definitions of IS and ISM; for initiatives intended …