Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis

Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis

Neil F. Doherty
DOI: 10.4018/978-1-60566-036-3.ch019
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Information is a critical corporate asset that has become increasingly vulnerable to attacks from viruses, hackers, criminals, and human error. Consequently, organizations are having to prioritize the security of their computer systems in order to ensure that their information assets retain their accuracy, confidentiality, and availability. While the importance of the information security policy (InSPy) in ensuring the security of information is acknowledged widely, to date there has been little empirical analysis of its impact or effectiveness in this role. To help fill this gap, an exploratory study was initiated that sought to investigate the relationship between the uptake and application of information security policies and the accompanying levels of security breaches. To this end, a questionnaire was designed, validated, and then targeted at IT managers within large organizations in the UK. The findings presented in this chapter are somewhat surprising, as they show no statistically significant relationships between the adoption of information security policies and the incidence or severity of security breaches. The chapter concludes by exploring the possible interpretations of this unexpected finding and its implications for the practice of information security management.
Chapter Preview
Top

Literature Review And Conceptual Framework

This section aims to present a discussion of the literature with regard to the role and importance of the InSPy and the common security threats, which such policies are intended to prevent. The section concludes with a critique of this literature, and the presentation of the conceptual framework for our study.

Complete Chapter List

Search this Book:
Reset