To read this content please select one of the options below:

Workarounds and trade-offs in information security – an exploratory study

Rogier Woltjer (Swedish Defence Research Agency (FOI), Linköping, Sweden)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 9 October 2017

453

Abstract

Purpose

The purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies and procedures), perceived trade-offs, information security (IS) policy compliance, IS expertise/knowledge and IS demands.

Design/methodology/approach

The research purpose is addressed using survey data from a nationwide sample of Swedish white-collar workers (N = 156).

Findings

Responses reinforce the notion that workarounds partly are something different from IS policy compliance and that workarounds-as-improvisations are used more frequently by employees that see more conflicts between IS and other goals (r = 0.351), and have more IS expertise/knowledge (r = 0.257). Workarounds-as-non-compliance are also used more frequently when IS trade-offs are perceived (r = 0.536). These trade-offs are perceived more by people working in organizations that handle information with high security demands (r = 0.265) and those who perform tasks with high IS demands (r = 0.178).

Originality/value

IS policies are an important part of IS governance. They describe the procedures that are supposed to provide IS. Researchers have primarily investigated how employees’ compliance with IS policies can be predicted and explained. There has been an increased interest in how tradeoffs and conflicts between following policies and other goals lead employees to make workarounds. Workarounds may leave management unaware of how work actually is done within the organization and may besides getting work done lead to new vulnerabilities. This study furthers the understanding of workarounds and trade-offs, which should be subject to further research.

Keywords

Acknowledgements

Dr Teodor Sommestad, Henrik Karlzén, Per-Anders Oskarsson and Dr Jonas Hallberg, all of FOI, are gratefully acknowledged for their support while preparing and writing this article. The members of the research program Security culture and information technology (SECURIT, www.foi.se/securit), especially those at Örebro University and Gothenburg University, are gratefully acknowledged for their contributions to the joint survey. Statistics Sweden are acknowledged for their support of reviewing and administering the survey. This research was funded by the Swedish Civil Contingencies Agency MSB as part of the SECURIT program.

Citation

Woltjer, R. (2017), "Workarounds and trade-offs in information security – an exploratory study", Information and Computer Security, Vol. 25 No. 4, pp. 402-420. https://doi.org/10.1108/ICS-02-2016-0017

Publisher

:

Emerald Publishing Limited

Copyright © 2017, Emerald Publishing Limited

Related articles