Writing Information Security Policies
Writing Information Security Policies
Trustbuilders and Trustbusters
I3E '01 Proceedings of the IFIP Conference on Towards The E-Society: E-Commerce, E-Business, E-Government
Information security standards focus on the existence of process, not its content
Communications of the ACM - Music information retrieval
Enterprise Security Architecture: A Business-Driven Approach
Enterprise Security Architecture: A Business-Driven Approach
Human-Machine Reconfigurations: Plans and Situated Actions
Human-Machine Reconfigurations: Plans and Situated Actions
Information security management standards: Problems and solutions
Information and Management
The compliance budget: managing security behaviour in organisations
Proceedings of the 2008 workshop on New security paradigms
Hi-index | 0.00 |
In May 2009 the Information Security Group, Royal Holloway, became host to a medical sociologist from St. George's Hospital, University of London, under EPSRC's discipline hopping scheme. As part of this knowledge transfer activity, a sociotechnical study group was formed comprising computer scientists, mathematicians, organisational researchers and a sociologist. The focus of this group is to consider different avenues of sociotechnical research in information security. This article briefly outlines some of the areas of research where sociotechnical studies might contribute to information security management.