Openly accessible

Enabling information security culture : influences and challenges for Australian SMEs

Dojkovski, Sneza, Lichtenstein, Sharman and Warren, Matthew 2010, Enabling information security culture : influences and challenges for Australian SMEs, in ACIS 2010 : Proceedings of the 21st Australasian Conference on Information Systems, ACIS, Brisbane, Qld..

Attached Files
Name Description MIMEType Size Downloads
lichtenstein-enablinginformation-2010.pdf Published version application/pdf 269.16KB 141

Title Enabling information security culture : influences and challenges for Australian SMEs
Author(s) Dojkovski, Sneza
Lichtenstein, Sharman
Warren, Matthew
Conference name Australasian Conference on Information Systems (21st : 2010 : Brisbane, Qld.)
Conference location Brisbane, Qld.
Conference dates 1-3 Dec. 2010
Title of proceedings ACIS 2010 : Proceedings of the 21st Australasian Conference on Information Systems
Editor(s) [Unknown]
Publication date 2010
Conference series Australasian Conference on Information Systems
Publisher ACIS
Place of publication Brisbane, Qld.
Keyword(s) Information security
Information security culture
Small and Medium Size enterprises
Summary An effective information security culture is vital to the success of information systems governance, risk management and compliance. Small and medium size enterprises (SMEs) face special challenges developing an information security culture as they may lack the information security knowledge, skills and behaviours of large organisations. This paper reports the main findings from an interpretive study of key influences enabling an effective information security culture for Australian SMEs. The paper provides a framework depicting external and internal influences on SME information security culture and a set of key challenges in the Australian context. The findings highlight that SME owner attitudes and behaviour – in turn influenced by government involvement - strongly influence information security culture for Australian SMEs. A surprising finding is the potential influence of the Australian culture. Practical and theoretical implications are discussed.
Notes Reproduced with the kind permission of the copyright owner.
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2010, Sneza Dojkovski, Sharman Lichtenstein and Matthew J. Warren
Persistent URL http://hdl.handle.net/10536/DRO/DU:30032167

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 365 Abstract Views, 143 File Downloads  -  Detailed Statistics
Created: Fri, 07 Jan 2011, 15:30:25 EST by Katrina Fleming

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.