Abstract
This paper presents the results of the latest survey on information security management and pracitces in organisations. The study is based on a holistic approach to information security that does not confine itself to technical measures and technology implementations, but encompasses other equally important aspects such as human, social, motiviational and trust. In order to achieve this purpose, a comprehensive intellectual framework of the concepts of information security using Soft Systems Methodology (SSM) was utilised. The survey questions were drived from this conceptual model to ensure their coherence, completeness and relevance to the topic being addressed. The paper concludes with a discussion of the survey results and draws significant insight into the existing status of informaiton assurance in organisations that could be useful for security practitioners, researchers and managers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
G. Booch and A. Brown (2003), Collaborative Development Environments. Advances in Computers, 2003. 59: p. 2–29.
P. Checkland (1999), Systems thinking, systems practice. Chichester: John Wiley.
F. J. Fowler (2002), Survey Research Methods. Sage Publications Inc.
S. P. MacGregor and T. Torres-Coronas (2007), Higher Creativity for Virtual Teams: Developing Platforms for Co-Creation. Information Science Reference.
J. Moore and L. Moyer (2002), Questionnaire Design Effects on Interview Outcomes. Survey Methodology, p. 3.
A. Mowshowitz and G. Walsham 1994), Virtual organization: a vision of management in the information age. An alternative view. Reply. The Information society, 10(4): p. 267–294.
P. Murray (1999), Fundamental issues in questionnaire design. Accident and Emergency Nursing, 7(3): p. 148–153.
C. O’Muircheartaigh (1997), Election 97: a triumph for the pollsters. MRS Res, p. 14–22.
A. Tawileh and S. McIntosh (2007), Understanding Information Assurance: A Soft Systems Approach. Proceedings of the United Kingdom Systems Society 11th International Conference, September 3–5, Oxford University, UK.
E. Taylor-Powell (1998), Questionnaire Design: Asking questions with a purpose.
H. F. Weisberg, J.A. Krosnick and B.D. Bowen (1996), An Introduction to Survey Research, Polling, and Data Analysis. Sage..
B. Wilson (1984), Systems: Concepts, Methodologies, and Applications. New York, NY: John Wiley & Sons, Inc.
D. Willimack et al. (2004), Evolution and Adaptation of Questionnaire Development, Evaluation, and Testing Methods for Establishment Surveys. Methods for testing and evaluating survey questionnaires. New York: John Wiley & Sons.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Tawileh, A., Hilton, J., McIntosh, S. (2009). Information Security Status in Organisations 2008. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9283-6_2
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0660-4
Online ISBN: 978-3-8348-9283-6
eBook Packages: Computer ScienceComputer Science (R0)