Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis

Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis

Neil F. Doherty
ISBN13: 9781605660363|ISBN10: 1605660361|ISBN13 Softcover: 9781616925017|EISBN13: 9781605660370
DOI: 10.4018/978-1-60566-036-3.ch019
Cite Chapter Cite Chapter

MLA

Doherty, Neil F. "Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis." Social and Human Elements of Information Security: Emerging Trends and Countermeasures, edited by Manish Gupta and Raj Sharman, IGI Global, 2009, pp. 326-342. https://doi.org/10.4018/978-1-60566-036-3.ch019

APA

Doherty, N. F. (2009). Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis. In M. Gupta & R. Sharman (Eds.), Social and Human Elements of Information Security: Emerging Trends and Countermeasures (pp. 326-342). IGI Global. https://doi.org/10.4018/978-1-60566-036-3.ch019

Chicago

Doherty, Neil F. "Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis." In Social and Human Elements of Information Security: Emerging Trends and Countermeasures, edited by Manish Gupta and Raj Sharman, 326-342. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-036-3.ch019

Export Reference

Mendeley
Favorite

Abstract

Information is a critical corporate asset that has become increasingly vulnerable to attacks from viruses, hackers, criminals, and human error. Consequently, organizations are having to prioritize the security of their computer systems in order to ensure that their information assets retain their accuracy, confidentiality, and availability. While the importance of the information security policy (InSPy) in ensuring the security of information is acknowledged widely, to date there has been little empirical analysis of its impact or effectiveness in this role. To help fill this gap, an exploratory study was initiated that sought to investigate the relationship between the uptake and application of information security policies and the accompanying levels of security breaches. To this end, a questionnaire was designed, validated, and then targeted at IT managers within large organizations in the UK. The findings presented in this chapter are somewhat surprising, as they show no statistically significant relationships between the adoption of information security policies and the incidence or severity of security breaches. The chapter concludes by exploring the possible interpretations of this unexpected finding and its implications for the practice of information security management.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.