Computer ethics: cautionary tales and ethical dilemmas in computing
Computer ethics: cautionary tales and ethical dilemmas in computing
Ethical concepts and information technology
Communications of the ACM
Accountability and computer decision systems
Communications of the ACM
Information Security Management: Global Challenges in the New Millennium
Information Security Management: Global Challenges in the New Millennium
Computer Security within Organizations
Computer Security within Organizations
Safe: Security Audit and Field Evaluation for Computer Facilities and Information Systems
Safe: Security Audit and Field Evaluation for Computer Facilities and Information Systems
Case Studies in Information and Computer Ethics
Case Studies in Information and Computer Ethics
Managing information systems security: a soft approach
ISCNZ '96 Proceedings of the 1996 Information Systems Conference of New Zealand (ISCNZ '96)
Knowledge management within information security: the case of Barings Bank
International Journal of Business Information Systems
Case study: Computer crime at CEFORMA: a case study
International Journal of Information Management: The Journal for Information Professionals
Knowledge management within information security: the case of Barings Bank
International Journal of Business Information Systems
Information security investment decisions: evaluating the Balanced Scorecard method
International Journal of Business Information Systems
Incorporating social-cultural contexts in role engineering: an activity theoretic approach
International Journal of Business Information Systems
International Journal of Business Information Systems
International Journal of Business Information Systems
International Journal of Business Information Systems
Hi-index | 0.00 |
Managing the growing problem of computer fraud within organisations has led researchers and practitioners to emphasise the need to take into account the 'social' aspects of information security. In addition, wider organisational issues such as lack of communication have been associated with computer fraud. In trying to minimise 'opportunities' for computer fraud, this paper argues that managers' awareness and knowledge of how an organisation functions can significantly affect the effectiveness of management information security. This is because managers can send 'cues' to other employees, which influence how the latter perceive and abide by information security and other policies and procedures in their daily activities. Such perception and application are examples of tacit knowledge development and use. In developing the argument, this paper uses the case of Barings Bank together with Mintzberg's five functions of an organisation. Thus it contributes in effective management of information security from a knowledge management perspective.