Wasting Time: The Mission Impossible with Respect to Technology‑Oriented Security Approaches
Keywords:
critical research, ICT security, organizational misbehaviour, learning, complianceAbstract
Security is still too orientated towards technology and behavioural aspects are under prioritized. Organisations focus on the ability of technology to minimise risks. This paper as a preliminary research of a PhD thesis will argue that this assumption and approach is misguided, so we will focus on how a critical approach is more useful to exposing these issues. The key to secure systems is employees' perception and the action they take in accordance with the learned and perceived need for an understanding of compliance. The paper is about critical approaches to research and it just happens to be information and communication technology (ICT) that is the subject area.Downloads
Published
Issue
Section
License
Open Access Publishing
The Electronic Journal of Business Research Methods operates an Open Access Policy. This means that users can read, download, copy, distribute, print, search, or link to the full texts of articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. The only constraint on reproduction and distribution, and the only role for copyright in this domain, is that authors control the integrity of their work, which should be properly acknowledged and cited.