Open Access. Powered by Scholars. Published by Universities.®
Information security behavior; information security compliance; work system design; information security program; data breach; case study
Articles 1 - 1 of 1
Full-Text Articles in Business
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Journal of Cybersecurity Education, Research and Practice
Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …