Change search
ReferencesLink to record
Permanent link

Direct link
The Influence of Organizational Culture on Information Security Policy Success
2014 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

It is generally accepted that the protection of the organization’s information assets begins with the creation of information security policies and it is these that serve as a blueprint against which the success of all information security efforts are hinged (Whitman and Mattord, 2009). Key to the success and effectiveness of these policies is human behaviour better still known as the human factor, which is described as the weakest link in information security (Mitnick et al. 2002). This assertion is also confirmed by Schneier (2000) who mentions that information security is only as good as its weakest link, and people are the weakest link in the chain. Every cultural setting (be it in an organization or other societal grouping) has particular values, beliefs and practices that it shares as part of its identity and it is these characteristics that largely influence the behaviours of the members. This assertion is confirmed by Triandis et al. (2002) who state that personality is shaped by both genetic and environmental influences but that the most important of the latter are cultural influences. Maccoby (2000) also tells us that personality emerges under the influence of both genes and environment but Loughling & Barling (2001) argue more emphatically that values, beliefs and attitudes significantly influence our behavior. Schein (2004) in his definition reveal that the collection of values, beliefs, practices and assumptions held by people in an organization, which are usually taken for granted, is what defines the organization’s culture. The objective of this research is to investigate the role that this culture (within organizations i.e. organizational culture) may have on the successful implementation of information security policies. The idea is to explore how organizational cultural characteristics can positively influence human behaviour which will then positively impact on information security policy success. If these particular organizational cultural traits are found to positively influence normative human behaviour and hence the successful implementation of information security policies, they can be adapted and/ or adopted by other organizations as part of their organization’s culture to increase their rate of success with security policy implementation. It is our belief that an approach to security policy implementation that is attended to from the organizational culture perspective (other than just security awareness or the use of security technology ) has a higher rate of success because the culture of the organization, like the information security policy is founded on the mission/vision of organization. We will carry out this research by exploring the organizational culture of UNICEF Ghana against the backdrop that they have been successful with the implementation information security policies.

Place, publisher, year, edition, pages
2014. , 87 p.
Keyword [en]
Technology, Information Security, Information Security Policy, Information Security Policy Implementation, Organizational Culture, Cultural Characteristics, Information Security Culture
Keyword [sv]
URN: urn:nbn:se:ltu:diva-52598Local ID: 9b83710e-acc0-48ce-bbba-c1ff57561ee0OAI: diva2:1025968
Subject / course
Student thesis, at least 30 credits
Educational program
Computer Science and Engineering, master's level
Validerat; 20140829 (global_studentproject_submitter)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

fulltext(869 kB)0 downloads
File information
File name FULLTEXT02.pdfFile size 869 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Hadjor, George TettehGadasu, Emmanuel Kwasi

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

ReferencesLink to record
Permanent link

Direct link