Information systems security research agenda: Exploring the gap between research and practice

The Journal of Strategic Information Systems - Tập 30 - Trang 101693 - 2021
Gurpreet Dhillon1, Kane Smith2, Indika Dissanayaka2
1Information Technology and Decision Sciences Department, G. Brint Ryan College of Business, University of North Texas, Denton, TX 26203, United States
2Information Systems and Supply Chain Management Department, Bryan School of Business & Economics, UNC Greensboro, Greensboro, NC 27402, United States

Tài liệu tham khảo

Abbasi, 2010, Detecting fake websites: The contribution of statistical learning theory, MIS Quarterly, 34, 435, 10.2307/25750686 Albrechtsen, 2007, A Qualitative Study of Users' View on Information Security, Computers & Security, 26, 276, 10.1016/j.cose.2006.11.004 Ande, 2020, Internet of Things: Evolution and technologies from a security perspective, Sustainable Cities and Society, 54, 101728, 10.1016/j.scs.2019.101728 Armstrong, H. 1999. “A Soft Approach to Management of Information Security,” PhD thesis in: School of Public Health. Perth, Australia: Curtin University, p. 343. Arun, R., Suresh, V., Madhavan, C. V., and Murthy, M. N. 2010. “On Finding the Natural Number of Topics with Latent Dirichlet Allocation: Some Observations,” Pacific-Asia Conference on Knowledge Discovery and Data Mining: Springer, p. 391-402. Aurigemma, 2019, Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Research, Journal of the Association for Information Systems, 20:12, 7 Backhouse, 1996, Structures of Responsibility and Security of Information Systems, European Journal of Information Systems, 5, 2, 10.1057/ejis.1996.7 Baskerville, 1987 Baskerville, 1988 Baskerville, 1993, Information Systems Security Design Methods: Implications for Information Systems Development, ACM Computing Surveys, 25, 375, 10.1145/162124.162127 Bauer, 2017, From Information Security Awareness to Reasoned Compliant Action: Analyzing Information Security Policy Compliance in a Large Banking Organization, Database for Advances in Information Systems, 48, 44, 10.1145/3130515.3130519 Blei, 2003, Latent Dirichlet Allocation, Journal of Machine Learning Research, 3:Jan, 993 Bostrom, 1977, MIS Problems and Failures: A Socio-Technical Perspective. Part I: The Causes, MIS Quarterly, 1, 17, 10.2307/248710 Burrell, 1979 Cao, 2009, A Density-Based Method for Adaptive LDA Model Selection, Neurocomputing, 72, 1775, 10.1016/j.neucom.2008.06.011 Charitoudi, 2014, An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense, Information Security Journal: A Global Perspective, 23, 125 Chatterjee, 2019, Reacting to the Scope of a Data Breach: The Differential Role of Fear and Anger, Journal of Business Research, 101, 183, 10.1016/j.jbusres.2019.04.024 Cheng, 2000, An object-oriented organizational model to support dynamic role-based access control in electronic commerce, Decision Support Systems, 29, 357, 10.1016/S0167-9236(00)00083-X Choi, 2015, Embarrassing exposures in online social networks: An integrated perspective of privacy invasion and relationship bonding, Information Systems Research, 26, 675, 10.1287/isre.2015.0602 Craig, 2014, 672 Crossler, 2013, Future Directions for Behavioral Information Security Research, Computers & Security, 32, 90, 10.1016/j.cose.2012.09.010 Damenu, 2017, Analysing Information Security in a Bank Using Soft Systems Methodology, Information & Computer Security, 25, 240, 10.1108/ICS-07-2016-0053 Deveaud, 2014, Accurate and Effective Latent Concept Modeling for Ad Hoc Information Retrieval, Document numérique, 17, 61, 10.3166/dn.17.1.61-84 1997 Dhillon, 2007 Dhillon, 2020, The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions, Journal of the Association for Information Systems, 21, 152, 10.17705/1jais.00595 Dhillon, 2001, Current Directions in Is Security Research: Towards Socio-Organizational Perspectives, Information Systems Journal, 11, 127, 10.1046/j.1365-2575.2001.00099.x Dhillon, S., and Coss, D. “Information Privacy Literature: issues and challenges,” Journal of Information System Security (15:3), p. 185-198. Dincelli, 2020, Choose Your Own Training Adventure: Designing a Gamified Seta Artefact for Improving Information Security and Privacy through Interactive Storytelling, European Journal of Information Systems, 1 Dobson, 1991, A Methodology for Analyzing Human and Computer-Related Issues in Secure Systems, 151 Eder-Neuhauser, 2018, Malware propagation in smart grid monoculturesMalware-Ausbreitung in Smart Grid-Monokulturen, Elektrotechnik and Informationstechnik, 135, 264, 10.1007/s00502-018-0616-5 Fernandez, 2008, “A Methodology to Develop Secure Systems Using Patterns,” in Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, IGI Global, 654 Furnell, 2012, Power to the People? The Evolving Recognition of Human Aspects of Security, Computers & Security, 31, 983, 10.1016/j.cose.2012.08.004 Goode, 2017, User Compensation as a Data Breach Recovery Action: An Investigation of the Sony Playstation Network Breach, MIS Quarterly, 41, 703, 10.25300/MISQ/2017/41.3.03 Griffiths, 2004, Finding Scientific Topics, Proceedings of the National Academy of Sciences, 101, 5228, 10.1073/pnas.0307752101 Gupta, 2021, An Attribute-Based Access Control for Cloud-Enabled Industrial Smart Vehicles, IEEE Transactions on Industrial Informatics, 17, 4288, 10.1109/TII.2020.3022759 Hammouchia, 2019, Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches over Time, Procedia Computer Science, 151, 1004, 10.1016/j.procs.2019.04.141 Hitchings, 1995, Deficiencies of the Traditional Approach to Information Security and the Requirements for a New Methodology, Computers & Security, 14, 377, 10.1016/0167-4048(95)97088-R Homoliak, 2019, Insight into Insiders and It: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures, ACM Computing Surveys (CSUR), 52, 1, 10.1145/3303771 Hong, 2014, A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research, Information Systems Research, 25, 111, 10.1287/isre.2013.0501 Huang, 2018, Analyst Information Discovery and Interpretation Roles: A Topic Modeling Approach, Management Science, 64, 2833, 10.1287/mnsc.2017.2751 Hurst, W., Merabti, M., and Fergus, P. 2014. “A Survey of Critical Infrastructure Security,” International Conference on Critical Infrastructure Protection, J. Butts and S. Shenoi (eds.), Arlington, VA: Springer, p. 127-138. Ifinedo, 2012, Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory, Computers & Security, 31, 83, 10.1016/j.cose.2011.10.007 James, H. 1996. “Managing Information Systems Security: A Soft Approach,” Information Systems Conference of New Zealand: IEEE Society Press. Jensen, 2017, Training to mitigate phishing attacks using mindfulness techniques, Journal of Management Information Systems, 34, 597, 10.1080/07421222.2017.1334499 Jiang, 2013, Research note—privacy concerns and privacy-protective behavior in synchronous online social interactions, Information Systems Research, 24, 579, 10.1287/isre.1120.0441 Johns, 2006, The Essential Impact of Context on Organizational Behavior, Academy of Management Review, 31, 386, 10.5465/amr.2006.20208687 Johnston, 2010, Fear Appeals and Information Security Behaviors: An Empirical Study, MIS Quarterly, 34, 549, 10.2307/25750691 Karjalainen, 2019, Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective, Information Systems Research, 30, 687, 10.1287/isre.2018.0827 Kabir, 2012, A role-involved purpose-based access control model, Information Systems Frontiers, 14, 809, 10.1007/s10796-011-9305-1 Karlsson, 2017, Practice-Based Discourse Analysis of Information Security Policies, Computers & Security, 67, 267, 10.1016/j.cose.2016.12.012 Keith, 2009, A behavioral analysis of passphrase design and effectiveness, Journal of the Association for Information Systems, 10, 63, 10.17705/1jais.00184 Khan, S., and Madnick, S. 2019. “Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigations in Industrial Control Systems,” Available at SSRN 3542551). Kordzadeh, 2017, Communicating personal health information in virtual health communities: An integration of privacy calculus model and affective commitment, Journal of the Association for Information Systems, 18, 45, 10.17705/1jais.00446 Kwon, J., and Johnson, M. E. 2011. “The Impact of Security Practices on Regulatory Compliance and Security Performance,” 32nd International Conference on Information Systems (ICIS). December 4-7, Shanghai, China. Leifer, R., Lee, S., and Durgee, J. 1994. “Deep Structures: Real Information Requirements Determination,” Information & Management 27(5), p. 275-285. Luse, A., Mennecke, B., Townsend, A., and Demarie, S. 2013. “Strategic Information Systems Security: Definition and Theoretical Model,” AMCIS 2013, August 15-17. Chicago, USA. McFadzean, E., Ezingeard, J.-N., and Birchall, D. 2006. “Anchoring Information Security Governance Research: Sociological Groundings and Future Directions,” Journal of Information System Security 2(3), p. 3-48. Mohamed, 2017, Trading Off Usability and Security in User Interface Design through Mental Models, Behaviour & Information Technology, 36, 493, 10.1080/0144929X.2016.1262897 Moody, 2018, Toward a Unified Model of Information Security Policy Compliance, MIS Quarterly, 42, 285, 10.25300/MISQ/2018/13853 Nazareth, 2015, A System Dynamics Model for Information Security Management, Information & Management, 52, 123, 10.1016/j.im.2014.10.009 Nissenbaum, 1994, Computing and Accountability, Communications of the ACM, 37, 73, 10.1145/175222.175228 Okoli, 2004, The Delphi Method as a Research Tool: An Example, Design Considerations and Applications, Information & Management, 42, 15, 10.1016/j.im.2003.11.002 Paananen, 2020, State of the Art in Information Security Policy Development, Computers & Security, 88, 1, 10.1016/j.cose.2019.101608 Paté-Cornell, 2018, Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies, Risk Analysis, 38, 226, 10.1111/risa.12844 Patterson, 2017, A Cyber-Threat Analytic Model for Autonomous Detection of Virtual Property Theft, Information & Computer Security, 25, 358, 10.1108/ICS-11-2016-0087 Perez, 2005, The Case of a Computer Hack, Journal of Information System Security, 1, 53 Ramesh, 2014, An efficacious method for detecting phishing webpages through target domain identification, Decision Support Systems, 61, 12, 10.1016/j.dss.2014.01.002 Rosemann, 2008, Toward Improving the Relevance of Information Systems Research to Practice: The Role of Applicability Checks, MIS Quarterly, 32, 1, 10.2307/25148826 Samonas, 2014, The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security, Journal of Information System Security, 10, 21 Sandhu, R., and Munawer, Q. 1998. “How to Do Discretionary Access Control Using Roles,” Proceedings of the third ACM workshop on Role-based access control, p. 47-54. Schmidt, 1997, Managing Delphi Surveys Using Nonparametric Statistical Techniques, Decision Sciences, 28, 763, 10.1111/j.1540-5915.1997.tb01330.x Silic, 2020, Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance, Journal of Management Information Systems, 37, 129, 10.1080/07421222.2019.1705512 Siponen, 2010, Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations, MIS Quarterly, 34, 487, 10.2307/25750688 Siponen, 2005, An Analysis of the Traditional Is Security Approaches: Implications for Research and Practice, European Journal of Information Systems, 14, 303, 10.1057/palgrave.ejis.3000537 Siponen, 2007, A Review of Information Security Issues and Respective Research Contributions, The Data Base for Advances in Information Systems, 38, 60, 10.1145/1216218.1216224 Spagnoletti, 2008, The Duality of Information Security Management: Fighting against Predictable and Unpredictable Threats, Journal of Information System Security, 4, 46 Steinbart, 2016, Examining the continuance of secure behavior: A longitudinal field study of mobile device authentication, Information Systems Research, 27, 219, 10.1287/isre.2016.0634 Straub, 2011, Editor's Comments: Rigor and Relevance in IS Research: Redefining the Debate and a Call for Future Research, MIS Quarterly, 35, iii, 10.2307/23043485 Sun, 2019, Modeling and Clustering Attacker Activities in Iot through Machine Learning Techniques, Information Sciences, 479, 456, 10.1016/j.ins.2018.04.065 Syed, 2019, Enterprise Reputation Threats on Social Media: A Case of Data Breach Framing, Journal of Strategic Information Systems, 28, 257, 10.1016/j.jsis.2018.12.001 Thomas, 2012, Interpreting Deep Structures of Information Systems Security, The Computer Journal, 55, 1148, 10.1093/comjnl/bxr118 Vance, 2012, Motivating Is Security Compliance: Insights from Habit and Protection Motivation Theory, Information & Management, 49, 190, 10.1016/j.im.2012.04.002 Vedder, 2017, Accountability for the Use of Algorithms in a Big Data Environment, International Review of Law, Computers & Technology, 31, 206, 10.1080/13600869.2017.1298547 White, E. F., and Dhillon, G. 2005. “Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems,” Proceedings of the 38th Annual Hawaii International Conference on System Sciences: IEEE, p. 186a-186a. Williams, 2013, Information Security Governance Practices in Critical Infrastructure Organizations: A Socio-Technical and Institutional Logic Perspective, Electronic Markets, 23, 341, 10.1007/s12525-013-0137-3 Wing, 1990, A Specifier's Introduction to Formal Methods, Computer, 23, 8, 10.1109/2.58215 Wing, J. M. 1998. “A Symbiotic Relationship between Formal Methods and Security,” Proceedings from Workshops on Computer Security, Fault Tolerance, and Software Assurance: From Needs to Solution, CMU-CS-98-188, December. Xue, 2011, Punishment, Justice, and Compliance in Mandatory It Settings, Information Systems Research, 22, 400, 10.1287/isre.1090.0266 Zviran, 1999, Password security: an empirical study, Journal of Management Information Systems, 15, 161, 10.1080/07421222.1999.11518226