One small step for a man
One Giant leap for the mankind

There is no wealth like Knowledge
                            No Poverty like Ignorance
Journal of Emerging Trends in Computing and Information Sciences Logo

Journal of Emerging Trends in Computing and Information Sciences >> Call for Papers Vol. 8 No. 3, March 2017

Journal of Emerging Trends in Computing and Information Sciences

Power Relations in Developing an Information Security Policy in Health Organizations: A Case Study

Full Text Pdf Pdf
Author Noli B. Lucila Jr.
ISSN 2079-8407
On Pages 244-255
Volume No. 7
Issue No. 5
Issue Date June 1, 2016
Publishing Date June 1, 2016
Keywords information security, information security policy, structuration theory, power and domination


Information security continues to be a key IT management issue among corporate executives. Given the prevalence of security risks, a growing number of organizations have established and maintained controls to preserve the confidentiality, integrity and availability of their valuable information assets. One of the most important security controls is information security policy, a direction-giving document usually containing guidelines on protecting information security assets. Existing literature on information security suggests that employees tend not to comply with security policies in place. One possibility is the lack of ownership of the policy, possibly due to a lack of participation in the process of creation. This process of creation can be understood to be shaped by social and political factors. However, limited research has been conducted exploring socio-organizational perspectives as well as complexities of power relationships in the development of information security policy. This study, therefore, examines social and political factors that shape the design of information security policy. A qualitative case study in a major department in the Philippine government was conducted through structuration theory.

    Journal of Computing | Call for Papers (CFP) | Journal Blog | Journal of Systems and Software | ARPN Journal of Science and Technology | International Journal of Health and Medical Sciences | International Journal of Economics, Finance and Management     
© 2015 Journal of Computing