Workarounds as Means to Identify Insider Threats to Information Systems Security - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2017

Workarounds as Means to Identify Insider Threats to Information Systems Security

Pierre-Emmanuel Arduin
  • Fonction : Auteur
  • PersonId : 964200
Dragos Vieru
  • Fonction : Auteur

Résumé

Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS security. In this article, we adopt the view that workarounds may enable the identification of new security threats. We propose a conceptual model that illustrates how workarounds generating non-malicious security violations might constitute sources of knowledge about new security threats.
Fichier principal
Vignette du fichier
PEA-DV-AMCIS-0041-2017-revised-final.pdf (185.91 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01637912 , version 1 (18-11-2017)

Identifiants

  • HAL Id : hal-01637912 , version 1

Citer

Pierre-Emmanuel Arduin, Dragos Vieru. Workarounds as Means to Identify Insider Threats to Information Systems Security. Association for Information Systems, Aug 2017, Boston, United States. ⟨hal-01637912⟩
78 Consultations
93 Téléchargements

Partager

Gmail Facebook X LinkedIn More