Security concerns of system users: a study of perceptions of the adequacy of security
Information and Management
Technological frames: making sense of information technology in organizations
ACM Transactions on Information Systems (TOIS) - Special issue on social science perspectives on IS
Evaluating security threats in mainframe and client/server environments
Information and Management
A set of principles for conducting and evaluating interpretive field studies in information systems
MIS Quarterly - Special issue on intensive research in information systems
Communications of the ACM
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Information systems security and privacy
Communications of the ACM
On the implementation of security measures in information systems
Communications of the ACM
Security issues for implementation of e-medical records
Communications of the ACM
Privacy of medical records: IT implications of HIPAA
ACM SIGCAS Computers and Society
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Security and privacy issues of handheld and wearable wireless devices
Communications of the ACM - Why CS students need math
Principles and Practice of Information Security
Principles and Practice of Information Security
Communications of the ACM - Homeland security
Why there aren't more information security research studies
Information and Management
The HIPAA-potamus in health care data security
Communications of the ACM - Has the Internet become indispensable?
Editorial: why HCI research in privacy and security is critical now
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
IT Governance: A Manager's Guide to Data Security and BS 7799/ISO 17799
IT Governance: A Manager's Guide to Data Security and BS 7799/ISO 17799
Corporate Computer and Network Security
Corporate Computer and Network Security
Representations and actions: the transformation of work practices with IT use
Information and Organization
The online privacy paradox: a social representations perspective
CHI '11 Extended Abstracts on Human Factors in Computing Systems
A risk-based evaluation of group access control approaches in a healthcare setting
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Value conflicts for information security management
The Journal of Strategic Information Systems
Hi-index | 0.00 |
This paper investigates the social representations of Information Systems (IS) security of different communities working in a healthcare organization. It considers questions of IS security as socially constructed and dependent on how people make sense of their context of work. The social representations perspective presented in this paper is especially useful to make sense of IS security from the point of view of various communities. The paper illustrates the relevance of this perspective by analyzing the differences and similarities in the way members of seven occupational communities (e.g., physicians, nurses, IS professionals) working in the same healthcare organization represent IS security. The paper finally draws the strategic implications for research and practice of considering the social representations of IS security. In particular, security and awareness programs should be customized to acknowledge that members of various communities ''know'' different things about security and that they react differently to various security initiatives.