Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization

@article{Smith2010CircuitsOP,
  title={Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization},
  author={S. Smith and D. Winchester and D. Bunker and R. Jamieson},
  journal={MIS Q.},
  year={2010},
  volume={34},
  pages={463-486}
}
  • S. Smith, D. Winchester, +1 author R. Jamieson
  • Published 2010
  • Computer Science
  • MIS Q.
  • Organizations need to protect information assets against cyber crime, denial-of-service attacks, web hackers, data breaches, identity and credit card theft, and fraud. Criminals often try to achieve financial, political, or personal gain through these attacks, so the threats that their actions prompt are insidious motivators for organizations to adopt information systems security (ISS) approaches. Extant ISS research has traditionally examined ISS in e-commerce business organizations. The… CONTINUE READING

    Figures, Tables, and Topics from this paper.

    Towards a Holistic Understanding of Security Process: Formal Controls and Informal Relationships
    • 1
    • Open Access
    Enterprise Computer Security: A Literature Review
    • 7
    • Open Access
    Using COBIT 5 for data breach prevention
    • 3
    • Open Access
    Information security as organizational power: A framework for re-thinking security policies
    • 6
    • Open Access
    Regulating Cyber Space: An Examination of U.S.-China Relations
    Organizational information security policies: a review and research framework
    • 62
    Information systems security policy implementation in practice: from best practices to situated practices
    • 24
    • Highly Influenced

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 134 REFERENCES
    Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard
    • 184
    • Highly Influential
    Information systems security design methods: implications for information systems development
    • 440
    • Open Access
    Power and politics in the adoption of information systems by organisations: the case of a research centre in Latin America
    • 20
    • Open Access
    Why there aren't more information security research studies
    • 352
    Future directions in technology-enabled crime: 2007-09
    • 56
    • Open Access
    Current directions in IS security research: towards socio‐organizational perspectives
    • 597
    Power and resistance in the implementation of a medical management information system
    • 242
    Determining Key Factors in E-Government Information System Security
    • 77
    • Open Access