Workarounds and trade-offs in information security-An exploratory study
(2017) In Information and Computer Security 25(4). p.402-420- Abstract
Purpose-The purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies and procedures), perceived trade-offs, information security (IS) policy compliance, IS expertise/knowledge and IS demands. Design/methodology/approach-The research purpose is addressed using survey data from a nationwide sample of Swedish white-collar workers (N = 156). Findings-Responses reinforce the notion that workarounds partly are something different from IS policy compliance and that workarounds-as-improvisations are used more frequently by employees that see more conflicts between IS and other goals (r = 0.351), and have more IS expertise/knowledge (r =... (More)
Purpose-The purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies and procedures), perceived trade-offs, information security (IS) policy compliance, IS expertise/knowledge and IS demands. Design/methodology/approach-The research purpose is addressed using survey data from a nationwide sample of Swedish white-collar workers (N = 156). Findings-Responses reinforce the notion that workarounds partly are something different from IS policy compliance and that workarounds-as-improvisations are used more frequently by employees that see more conflicts between IS and other goals (r = 0.351), and have more IS expertise/knowledge (r = 0.257). Workarounds-as-non-compliance are also used more frequently when IS trade-offs are perceived (r = 0.536). These trade-offs are perceived more by people working in organizations that handle information with high security demands (r = 0.265) and those who perform tasks with high IS demands (r = 0.178). Originality/value-IS policies are an important part of IS governance. They describe the procedures that are supposed to provide IS. Researchers have primarily investigated how employees' compliance with IS policies can be predicted and explained. There has been an increased interest in how tradeoffs and conflicts between following policies and other goals lead employees to make workarounds. Workarounds may leave management unaware of how work actually is done within the organization and may besides getting work done lead to new vulnerabilities. This study furthers the understanding of workarounds and trade-offs, which should be subject to further research.
(Less)
- author
- Woltjer, Rogier LU
- publishing date
- 2017
- type
- Contribution to journal
- publication status
- published
- subject
- keywords
- Expertise, Information security, Information security demands, Policy, Trade-offs, Workarounds
- in
- Information and Computer Security
- volume
- 25
- issue
- 4
- pages
- 19 pages
- publisher
- Emerald Group Publishing Limited
- external identifiers
-
- scopus:85031311917
- ISSN
- 2056-4961
- DOI
- 10.1108/ICS-02-2016-0017
- language
- English
- LU publication?
- no
- additional info
- Publisher Copyright: © Emerald Publishing Limited.
- id
- 3480b6a6-161d-43f7-bdf3-91578d2c8aad
- date added to LUP
- 2024-03-05 18:47:35
- date last changed
- 2024-03-07 10:31:16
@article{3480b6a6-161d-43f7-bdf3-91578d2c8aad, abstract = {{<p>Purpose-The purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies and procedures), perceived trade-offs, information security (IS) policy compliance, IS expertise/knowledge and IS demands. Design/methodology/approach-The research purpose is addressed using survey data from a nationwide sample of Swedish white-collar workers (N = 156). Findings-Responses reinforce the notion that workarounds partly are something different from IS policy compliance and that workarounds-as-improvisations are used more frequently by employees that see more conflicts between IS and other goals (r = 0.351), and have more IS expertise/knowledge (r = 0.257). Workarounds-as-non-compliance are also used more frequently when IS trade-offs are perceived (r = 0.536). These trade-offs are perceived more by people working in organizations that handle information with high security demands (r = 0.265) and those who perform tasks with high IS demands (r = 0.178). Originality/value-IS policies are an important part of IS governance. They describe the procedures that are supposed to provide IS. Researchers have primarily investigated how employees' compliance with IS policies can be predicted and explained. There has been an increased interest in how tradeoffs and conflicts between following policies and other goals lead employees to make workarounds. Workarounds may leave management unaware of how work actually is done within the organization and may besides getting work done lead to new vulnerabilities. This study furthers the understanding of workarounds and trade-offs, which should be subject to further research.</p>}}, author = {{Woltjer, Rogier}}, issn = {{2056-4961}}, keywords = {{Expertise; Information security; Information security demands; Policy; Trade-offs; Workarounds}}, language = {{eng}}, number = {{4}}, pages = {{402--420}}, publisher = {{Emerald Group Publishing Limited}}, series = {{Information and Computer Security}}, title = {{Workarounds and trade-offs in information security-An exploratory study}}, url = {{http://dx.doi.org/10.1108/ICS-02-2016-0017}}, doi = {{10.1108/ICS-02-2016-0017}}, volume = {{25}}, year = {{2017}}, }