Information security: A stakeholder network perspective

Philip Seltsikas, Max Soyref

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Despite existing approaches and techniques for securing corporate information assets, information security threats continue to challenge business and government. Research suggests that to improve the effectiveness of information security a clear understanding of the organisational context is required. We have used stakeholder salience and stakeholder networks lenses to identify key stakeholders who shaped the information security processes of a large Australian financial institution. We have also examined how the interrelationships between these stakeholders might impact on their role in a stakeholder network. Our research suggests that a number of key stakeholders exist who require attention and engagement from those responsible for information security. We also highlight several stakeholders that have traditionally been given lower priority, but should be seen as more important due to their positioning and influence on the stakeholder network. We suggest that a better understanding more concerted engagement with these stakeholders can assist information security teams in achieving organisational security objectives.

Original languageEnglish
Title of host publicationProceedings of the 24th Australasian Conference on Information Systems
PublisherRMIT University
ISBN (Electronic)9780992449506
Publication statusPublished - 2013
Externally publishedYes
Event24th Australasian Conference on Information Systems, ACIS2013 - Melbourne, Australia
Duration: 4 Dec 20136 Dec 2013

Publication series

NameProceedings of the 24th Australasian Conference on Information Systems

Conference

Conference24th Australasian Conference on Information Systems, ACIS2013
Country/TerritoryAustralia
CityMelbourne
Period4/12/136/12/13

Keywords

  • Information security
  • Stakeholder network
  • Stakeholders

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'Information security: A stakeholder network perspective'. Together they form a unique fingerprint.

Cite this