posted on 2011-11-09, 11:26authored byNeil Doherty, Leonidas Anastasakis, Heather Fulford
Increasingly users are seen as the weak link in the chain, when it comes to the
security of corporate information. Should the users of computer systems act in any
inappropriate or insecure manner, then they may put their employers in danger of financial
losses, information degradation or litigation, and themselves in danger of dismissal or
prosecution. This is a particularly important concern for knowledge-intensive organisations,
such as Universities, as the effective conduct of their core teaching and research activities is
becoming ever more reliant on the availability, integrity and accuracy of computer-based
information resources. One increasingly important mechanism for reducing the occurrence of
inappropriate behaviours, and in so doing, protecting corporate information, is through the
formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has
attracted some academic interest, it has tended to be prescriptive and overly focussed on
the role of the Internet, and there is relatively little empirical material that explicitly addresses
the purpose, positioning or content of real acceptable use policies. The broad aim of the
study, reported in this paper, is to fill this gap in the literature by critically examining the
structure and composition of a sample of authentic policies – taken from the higher
education sector - rather than simply making general prescriptions about what they ought to
contain. There are two important conclusions to be drawn from this study: 1) the primary role
of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather
than proactively promoting desirable and effective security behaviours, and 2) the wide
variation found in the coverage and positioning of the reviewed policies is unlikely to be
fostering a coherent approach to security management, across the higher education sector.
History
School
Business and Economics
Department
Business
Citation
DOHERTY, N.F., ANASTASAKIS, L. and FULFORD, H., 2011. Reinforcing the security of corporate information resources: a critical review of the role of the acceptable use policy. International Journal of Information Management, 31(3), pp. 201-9