Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Workarounds and trade-offs in information security-An exploratory study

Woltjer, Rogier LU (2017) In Information and Computer Security 25(4). p.402-420
Abstract

Purpose-The purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies and procedures), perceived trade-offs, information security (IS) policy compliance, IS expertise/knowledge and IS demands. Design/methodology/approach-The research purpose is addressed using survey data from a nationwide sample of Swedish white-collar workers (N = 156). Findings-Responses reinforce the notion that workarounds partly are something different from IS policy compliance and that workarounds-as-improvisations are used more frequently by employees that see more conflicts between IS and other goals (r = 0.351), and have more IS expertise/knowledge (r =... (More)

Purpose-The purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies and procedures), perceived trade-offs, information security (IS) policy compliance, IS expertise/knowledge and IS demands. Design/methodology/approach-The research purpose is addressed using survey data from a nationwide sample of Swedish white-collar workers (N = 156). Findings-Responses reinforce the notion that workarounds partly are something different from IS policy compliance and that workarounds-as-improvisations are used more frequently by employees that see more conflicts between IS and other goals (r = 0.351), and have more IS expertise/knowledge (r = 0.257). Workarounds-as-non-compliance are also used more frequently when IS trade-offs are perceived (r = 0.536). These trade-offs are perceived more by people working in organizations that handle information with high security demands (r = 0.265) and those who perform tasks with high IS demands (r = 0.178). Originality/value-IS policies are an important part of IS governance. They describe the procedures that are supposed to provide IS. Researchers have primarily investigated how employees' compliance with IS policies can be predicted and explained. There has been an increased interest in how tradeoffs and conflicts between following policies and other goals lead employees to make workarounds. Workarounds may leave management unaware of how work actually is done within the organization and may besides getting work done lead to new vulnerabilities. This study furthers the understanding of workarounds and trade-offs, which should be subject to further research.

(Less)
Please use this url to cite or link to this publication:
author
publishing date
type
Contribution to journal
publication status
published
subject
keywords
Expertise, Information security, Information security demands, Policy, Trade-offs, Workarounds
in
Information and Computer Security
volume
25
issue
4
pages
19 pages
publisher
Emerald Group Publishing Limited
external identifiers
  • scopus:85031311917
ISSN
2056-4961
DOI
10.1108/ICS-02-2016-0017
language
English
LU publication?
no
additional info
Publisher Copyright: © Emerald Publishing Limited.
id
3480b6a6-161d-43f7-bdf3-91578d2c8aad
date added to LUP
2024-03-05 18:47:35
date last changed
2024-03-07 10:31:16
@article{3480b6a6-161d-43f7-bdf3-91578d2c8aad,
  abstract     = {{<p>Purpose-The purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies and procedures), perceived trade-offs, information security (IS) policy compliance, IS expertise/knowledge and IS demands. Design/methodology/approach-The research purpose is addressed using survey data from a nationwide sample of Swedish white-collar workers (N = 156). Findings-Responses reinforce the notion that workarounds partly are something different from IS policy compliance and that workarounds-as-improvisations are used more frequently by employees that see more conflicts between IS and other goals (r = 0.351), and have more IS expertise/knowledge (r = 0.257). Workarounds-as-non-compliance are also used more frequently when IS trade-offs are perceived (r = 0.536). These trade-offs are perceived more by people working in organizations that handle information with high security demands (r = 0.265) and those who perform tasks with high IS demands (r = 0.178). Originality/value-IS policies are an important part of IS governance. They describe the procedures that are supposed to provide IS. Researchers have primarily investigated how employees' compliance with IS policies can be predicted and explained. There has been an increased interest in how tradeoffs and conflicts between following policies and other goals lead employees to make workarounds. Workarounds may leave management unaware of how work actually is done within the organization and may besides getting work done lead to new vulnerabilities. This study furthers the understanding of workarounds and trade-offs, which should be subject to further research.</p>}},
  author       = {{Woltjer, Rogier}},
  issn         = {{2056-4961}},
  keywords     = {{Expertise; Information security; Information security demands; Policy; Trade-offs; Workarounds}},
  language     = {{eng}},
  number       = {{4}},
  pages        = {{402--420}},
  publisher    = {{Emerald Group Publishing Limited}},
  series       = {{Information and Computer Security}},
  title        = {{Workarounds and trade-offs in information security-An exploratory study}},
  url          = {{http://dx.doi.org/10.1108/ICS-02-2016-0017}},
  doi          = {{10.1108/ICS-02-2016-0017}},
  volume       = {{25}},
  year         = {{2017}},
}