Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS security. In this article, we adopt the view that workarounds may enable the identification of new security threats. We propose a conceptual model that illustrates how workarounds generating non-malicious security violations might constitute sources of knowledge about new security threats
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Purpose - The purpose of this paper is to provide an analysis of the studies about workaround behavi...
Modern organizations face significant information security violations from inside the organizations ...
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and ...
An understanding of insider threats in information systems (IS) is important to help address one of ...
Abstract—An enterprise’s information security policy is an exceptionally important control as it pro...
Over the past decade, several studies, industry reports and surveys have revealed that insider threa...
Several studies have hinted how the study of workarounds can help organizations to improve business ...
Workarounds are still one of the most puzzling phenomena in business process management research and...
Workarounds as deviations from defined routines in business processes challenge standardization and ...
\u3cp\u3eSeveral studies have hinted how the study of workarounds can help organizations to improve ...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
We reviewed papers in core IS outlets that defined the term workaround or presented an example of a ...
Modern organizations face significant information security violations from inside the organizations ...
Health Information Systems are built to support work processes in healthcare organisations. In advan...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Purpose - The purpose of this paper is to provide an analysis of the studies about workaround behavi...
Modern organizations face significant information security violations from inside the organizations ...
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and ...
An understanding of insider threats in information systems (IS) is important to help address one of ...
Abstract—An enterprise’s information security policy is an exceptionally important control as it pro...
Over the past decade, several studies, industry reports and surveys have revealed that insider threa...
Several studies have hinted how the study of workarounds can help organizations to improve business ...
Workarounds are still one of the most puzzling phenomena in business process management research and...
Workarounds as deviations from defined routines in business processes challenge standardization and ...
\u3cp\u3eSeveral studies have hinted how the study of workarounds can help organizations to improve ...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
We reviewed papers in core IS outlets that defined the term workaround or presented an example of a ...
Modern organizations face significant information security violations from inside the organizations ...
Health Information Systems are built to support work processes in healthcare organisations. In advan...
An insider is a person that has or had a legitimate right to access computing resources of an organi...
Purpose - The purpose of this paper is to provide an analysis of the studies about workaround behavi...
Modern organizations face significant information security violations from inside the organizations ...