In this paper we present a Value Sensitive Approach (VSA) to information systems security (ISS) within organizations. The approach helps to identify organizational and individual values, since we believe that objectives suitable for each organization can be identified by eliciting these values. We then discuss how organizational goals, strategies and culture together with individual values decide what relevant security issues for this particular organization are. We then discuss how organizational goals, strategies and culture, together with individual values decide the relevant security issues for a particular organization. Different methods to observe and identify values are discussed and evaluated. Then two different methods for identify...
Abstract. In this paper we present an approach for specifying and pri-oritizing information security...
In this paper we present an approach for specifying and prioritizing information security requiremen...
With powerful regulations surrounding security and privacy of information, the authors attempt to id...
In this paper we present a Value Sensitive Approach (VSA) to information systems security (ISS) with...
This paper presents findings of an empirical study of information system (IS) security values adhere...
Currently, security is the buzz word, both in academia and practice. Even a cursory glance at the In...
This paper aims to explore social and organizational aspects of information security management. The...
Abstract. In this paper we present an approach for specifying and prioritizing information security ...
In this paper we present an approach for specifying and prioritizing information security requiremen...
Information Systems (IS) security management has gained renewed importance for the past few years re...
This paper investigates the interrelationship and ejfect of trust and culture on the level of goal s...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
This thesis examines the concepts of Information System (IS) security assurance using a socio-techni...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
In this paper we present an approach for specifying and prioritizing information security requiremen...
Abstract. In this paper we present an approach for specifying and pri-oritizing information security...
In this paper we present an approach for specifying and prioritizing information security requiremen...
With powerful regulations surrounding security and privacy of information, the authors attempt to id...
In this paper we present a Value Sensitive Approach (VSA) to information systems security (ISS) with...
This paper presents findings of an empirical study of information system (IS) security values adhere...
Currently, security is the buzz word, both in academia and practice. Even a cursory glance at the In...
This paper aims to explore social and organizational aspects of information security management. The...
Abstract. In this paper we present an approach for specifying and prioritizing information security ...
In this paper we present an approach for specifying and prioritizing information security requiremen...
Information Systems (IS) security management has gained renewed importance for the past few years re...
This paper investigates the interrelationship and ejfect of trust and culture on the level of goal s...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
This thesis examines the concepts of Information System (IS) security assurance using a socio-techni...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
In this paper we present an approach for specifying and prioritizing information security requiremen...
Abstract. In this paper we present an approach for specifying and pri-oritizing information security...
In this paper we present an approach for specifying and prioritizing information security requiremen...
With powerful regulations surrounding security and privacy of information, the authors attempt to id...