Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies’ Information Security Policies

  • Conference paper
  • First Online:
Human Aspects of Information Security and Assurance (HAISA 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 674))

  • 688 Accesses

Abstract

Information security policies (ISPs) are an essential type of formal control that must be designed in a manner that is easily understandable for employees. Prior studies have recommended the inclusion of actionable advice; however, it is unclear how such advice should be worded to minimize the scope for interpretation. Therefore, this study investigates existing ISPs to assess how clear the pieces of actionable advice are and provide suggestions on how actionable advice should be worded in order to be clear. A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. First, the findings revealed an unbalance between the ISPs, where one-third of the ISPs provide over 50% of the analyzed actionable advice. Second, around two-thirds offer advice that is ambiguous and does not provide advice that employees can act upon. We, therefore, recommended that ISP designers exercise caution when using words in the ISP and maintain consistency in their word choices throughout.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alshaikh, M., Maynard, S.B., Ahmad, A., Chang, S.: Information security policy: a management practice perspective. In: Australasian Conference on Information Systems (2015)

    Google Scholar 

  • Assarroudi, A., Heshmati Nabavi, F., Armat, M.R., Ebadi, A., Vaismoradi, M.: Directed qualitative content analysis: the description and elaboration of its underpinning methods and data analysis process. J. Res. Nurs. 23(1), 42–55 (2018)

    Article  Google Scholar 

  • Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–548 (2010)

    Article  Google Scholar 

  • Chowdhury, N.H., Adam, M.T., Skinner, G.: The impact of time pressure on cybersecurity behaviour: a systematic literature review. Behav. Inf. Technol. 38(12), 1290–1308 (2019)

    Article  Google Scholar 

  • Demsar, J., et al.: Orange: data mining toolbox in python. J. Mach. Learn. Res. 14 2349–2353 (2013).https://jmlr.org/papers/volume14/demsar13a/demsar13a.pdf

  • Diver, S.: Information Security Policy - A Development Guide for Large and Small Companies. SANS Institute (2021)

    Google Scholar 

  • Goel, S., Chengalur-Smith, I.N.: Metrics for characterizing the form of security policies. J. Strateg. Inf. Syst. 19(4), 281–295 (2010)

    Article  Google Scholar 

  • Höne, K., Eloff, J.H.P.: What makes an effective information security policy? Netw. Secur. 2002(6), 14–16 (2002b)

    Article  Google Scholar 

  • Hsieh, H.-F., Shannon, S.E.: Three approaches to qualitative content analysis. Qual. Health Res. 15(9), 1277–1288 (2005)

    Article  Google Scholar 

  • Karlsson, F., Hedström, K., Goldkuhl, G.: Practice-based discourse analysis of information security policies. Comput. Secur. 67, 267–279 (2017). https://doi.org/10.1016/j.cose.2016.12.012

    Article  Google Scholar 

  • Kör, B., Metin, B.: Understanding human aspects for an effective information security management implementation. Int. J. Appl. Decis. Sci. 14(2), 105–122 (2021)

    Google Scholar 

  • Loch, K.D., Carr, H.H., Warkentin, M.E.: Threats to information systems: today’s reality, yesterday’s understanding. MIS Q. 16, 173–186 (1992)

    Article  Google Scholar 

  • Ponemon Institute LLC. Cost of Insider Threats: Global Report (2020). https://www.ibm.com/downloads/cas/LQZ4RONE

  • PWC. The Information Security Breaches Survey - Technical Report. Department for Business, Innovation and Skills (BIS), London, UK (2014).

    Google Scholar 

  • Rostami, E.: Tailoring information security policies–a computerized tool and a design theory Örebro universitet] (2023)

    Google Scholar 

  • Rostami, E., Karlsson, F., Gao, S.: Requirements for computerized tools to design information security policies. Comput. Secur. 99, 102063 (2020)

    Article  Google Scholar 

  • Rostami, E., Karlsson, F., Gao, S.: Policy components–a conceptual model for modularizing and tailoring of information security policies. Inf. Comput. Secur. 31, 331–352 (2023)

    Article  Google Scholar 

  • SFS. 2009:400 Offentlighets- och sekretesslag. Justitiedepartementet, Stockholm (2009)

    Google Scholar 

  • Stahl, B.C., Doherty, N.F., Shaw, M.: Information security policies in the UK healthcare sector: a critical evaluation. Inf. Syst. J. 22, 77–94 (2012)

    Article  Google Scholar 

  • Sundt, C.: Information security and the law. Inf. Secur. Tech. Rep. 11(1), 2–9 (2006)

    Article  Google Scholar 

  • Whitman, M.: Security policy: from design to maintenance. In: Straub, D.W., Goodman, S.E., Baskerville, R. (eds.) Information security: Policy, processes, and practices, pp. 123–151. M. E. Sharpe, New York (2008)

    Google Scholar 

  • Willison, R., Warkentin, M.: Beyond deterrence: an expanded view of employee computer abuse. MIS Q. 37, 1–20 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elham Rostami .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rostami, E., Karlsson, F. (2023). A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies’ Information Security Policies. In: Furnell, S., Clarke, N. (eds) Human Aspects of Information Security and Assurance. HAISA 2023. IFIP Advances in Information and Communication Technology, vol 674. Springer, Cham. https://doi.org/10.1007/978-3-031-38530-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-38530-8_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-38529-2

  • Online ISBN: 978-3-031-38530-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics