Search results for "security policy"
showing 10 items of 46 documents
Employee Information Security Practices: A Framework and Research Agenda
2020
Author's accepted manuscript Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This paper synthesizes insights from research on challenges related to employee information security practices and measures to address them. The challenges identified are associated to idiosyncratic aspects of communities and individuals within organizations (culture and personal characteristics) and to systemic aspects of organizations (procedural and structural arrangements). The measures identified aim to enhance systemic capabilities and to adapt security mechanisms to the idiosyncratic characteristics and are categorized as: (a) measures of training an…
Suomalaisen turvallisuuspolitiikan tila : suomalaisen 2000-luvun alun turvallisuuspoliittisen debatin käsiteanalyyttinen tarkastelu
2011
Generating policy in a changing governmental environment: how to study security policy in generation?
2008
The purpose of this paper is to deliberate the making of security policy in the EU-context, where national security discourse will increasingly face needs and demands to be melt together with a new kind of security discourse and policy of mainland Europe. By taking the viewpoint of a citizen of a modern nation-state, this paper wants to open the question of how citizens and their values are positioned in relation to the modern state and its security policy within this progress. In particular, as the two latter concepts are in motion towards some new essence. This article claims that the ongoing shaping of the new European security discourse, and values it is argued to contain, appears to ci…
Video surveillance and security policy in France: From regulation to widespread acceptance
2011
This article presents a historical account of the introduction and use of video surveillance cameras in France. Specific reference is made of the introduction of regulatory and legislative arrangements and to political debates surrounding the provision of video surveillance cameras. A feature of the French context has been a desire by national government to install cameras more widely in public places and a resistance to do so by local regions (departments). This highlights a traditional tension between central and local government in France and the significance of political rhetoric to the ongoing installation and operation of video surveillance cameras.
Can individuals’ neutralization techniques be overcome? A field experiment on password policy
2020
Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…
Foreign and Security Policy
2015
In early 2014 the foreign and security policy discourse in the Baltic region was transformed as a resurgent and assertive Russia annexed Crimea and launched covert operations in eastern Ukraine.1 Observers were quick to point out that events in Ukraine eerily paralleled the 1940 occupation of the Baltic states. The traditional security concerns about Russian intentions in the region that the Baltic states had increasingly suppressed over the previous 20 years once again rushed to the surface. The post-existential era of Baltic foreign and security policy that had marked the decade that followed accession to the EU and NATO seemed to have come to an end.
Method Framework for Developing Enterprise Architecture Security Principles
2019
Organizations need to consider many facets of information security in their daily operations – among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations’ core resources provoke new threats that can be difficult to anticipate. It has been argued that the security and privacy considerations should be embedded in all the areas of organizational activities instead of only relying technical security mechanisms provided by the underlying systems and software. Enterprise Architecture Management (EAM) offers a holistic approach for managing different dimensions of an organization, and can be conceived as a coherent and consistent set of principles tha…
Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies
2021
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply w…
"Waiting for Godot?" : Lithuania and the European Security Order in the 21-century
2000
Lietuvos užsienio ir saugumo politikos principai, kryptys ir pagrindiniai tikslai liko iš esmės nepakitę nuo pat valstybingumo atkūrimo, tačiau politinių sprendimų priėmimo kontekstas per tą laiką gerokai pasikeitė ir keičiasi toliau. Vidurio ir Rytų Europoje žlugus komunistiniams režimams, Šaltojo karo tvarka žlugo neįtikėtinai greitai. 2000 m. aiškėja, kad strateginė aplinka ir mūsų saugumo suvokimas taip pat pakito. Nors Vidurio ir Rytų Europos lyderiai nepamiršta sovietinės praeities, pastarieji dešimt metų leidžia tikėtis, kad šioms valstybėms pavyks sėkmingai integruotis į Vakarų Europos struktūras. 1999 m. Kosovo kampanija privertė peržiūrėti tarptautinio saugumo sampratą, Europos Są…
Integrating nascent organisations. On the settlement of the European External Action Service
2016
This study shows how the EU’s new Common Foreign and Security policy (CFSP) administration – the European External Action Service (EEAS) – experienced early organisational settlement. We find that the EEAS acts relatively independently from member-state governments, suggesting administrative autonomy. It is also relatively integrated into the Commission structure, suggesting inter-institutional integration of sub-units in the two institutions. Important lessons can be learned. For organisation theory: Firstly, nascent organisations are likely to experience some degree of ‘settlement’ after birth by establishing ties towards organisations from which they originate. Secondly, settlement is in…