Information systems security: management success factors
Computers and Security
In the age of the smart machine: the future of work and power
In the age of the smart machine: the future of work and power
Power over users: its exercise by system professionals
Communications of the ACM
Survivability—a new technical and business perspective on security
Proceedings of the 1999 workshop on New security paradigms
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Power, politics, and MIS implementation
Communications of the ACM
Redefining Information Systems Security: Viable Information Systems
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
Feature: What Makes an Effective Information Security Policy?
Network Security
Hi-index | 0.00 |
This paper uses the perspective of power in the study of IS security management. We explore the role of power in the implementation of an information systems security policy, using the Circuits of Power as a Framework for the analysis. A case study research was conducted in a public sector organization that introduced a security policy in order to comply with the law. The authors interviewed members of the organization to explore the different aspects of power relations which were intertwined with the implementation of the policy and used the Circuits of Power to analyze the data gathered. The conclusions derived from the analysis illustrate the role of power in the policy implementation process and indicate that a power perspective provides useful insight in the study of factors affecting the implementation of security policies.