6533b823fe1ef96bd127e0b3

RESEARCH PRODUCT

Abductive innovations in information security policy development : an ethnographic study

Elina NiemimaaMarko Niemimaa

subject

ISS policyKnowledge managementetnografiabusiness.industryBest practice05 social sciencestietoturvapolitiikkaorganisaatiot02 engineering and technologyInformation securityLibrary and Information Sciencesyrityksetinnovaatiotabductive innovation020204 information systemsPolitical science0502 economics and businessEthnography0202 electrical engineering electronic engineering information engineeringInformation security policytietoturvabusiness050203 business & managementInformation Systemsinformation security policy development

description

Developing organisational information security (InfoSec) policies that account for international best practices but are contextual is as much an opportunity for improving InfoSec as it is a challenge. Previous research indicates that organisations should create InfoSec policies based on best practices (top-down) and simultaneously encourages participatory development (bottom-up). These contradictory suggestions place managers in a dilemma: Should they follow a top-down or bottom-up approach? In this research, we build on an ethnographic approach to study how an innovative engineering company (MachineryCorp) managed the contradiction when the firm developed an InfoSec policy. Drawing on the dialectical theory of organisations as a lens, the findings suggest the InfoSec policy development is a recurrent process consisting of three phases: (1) drawing interpretations of InfoSec requirements from best practices (deductive adoption) and (2) constructing possibilities for local implementation (inductive adjustment) (3) that engender tensions between best practices and local contingencies facilitating innovative local resolutions (synthetic innovation). We call this process abductive innovation. At MachineryCorp, a triangle of tensions surfaced due to economic realities, infrastructure affordances, and social arrangements, and were necessary in explaining how the InfoSec policy gradually and iteratively materialised and resulted in an organisationally contingent policy. peerReviewed

http://urn.fi/URN:NBN:fi:jyu-202001081086