• xmlui.mirage2.page-structure.header.title
    • français
    • English
  • Help
  • Login
  • Language 
    • Français
    • English
View Item 
  •   BIRD Home
  • DRM (UMR CNRS 7088)
  • DRM : Publications
  • View Item
  •   BIRD Home
  • DRM (UMR CNRS 7088)
  • DRM : Publications
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

BIRDResearch centres & CollectionsBy Issue DateAuthorsTitlesTypeThis CollectionBy Issue DateAuthorsTitlesType

My Account

LoginRegister

Statistics

Most Popular ItemsStatistics by CountryMost Popular Authors
Thumbnail

Workarounds as Means to Identify Insider Threats to Information Systems Security

Arduin, Pierre-Emmanuel; Vieru, Dargos (2017), Workarounds as Means to Identify Insider Threats to Information Systems Security, Proceedings of the Twenty-third Americas Conference on Information Systems, Boston, USA, August 10-12, Association for Information Systems

View/Open
PEA-DV-AMCIS-0041-2017-revised-final.pdf (185.9Kb)
Type
Communication / Conférence
Date
2017
Conference title
Association for Information Systems
Conference date
2017-08
Conference city
Boston
Conference country
United States
Book title
Proceedings of the Twenty-third Americas Conference on Information Systems, Boston, USA, August 10-12
Publisher
Association for Information Systems
Metadata
Show full item record
Author(s)
Arduin, Pierre-Emmanuel
Dauphine Recherches en Management [DRM]
Vieru, Dargos
Abstract (EN)
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS security. In this article, we adopt the view that workarounds may enable the identification of new security threats. We propose a conceptual model that illustrates how workarounds generating non-malicious security violations might constitute sources of knowledge about new security threats.
Subjects / Keywords
Workarounds; Insider threat; Security policy; Non-malicious security violation
JEL
M15 - IT Management

Related items

Showing items related by title and author.

  • Thumbnail
    Strategies to Reduce Knowledge Leakage: A Knowledge Absorptive Capacity-Based Framework 
    Ziam, Saliha; Arduin, Pierre-Emmanuel; Vieru, Dargos (2018) Communication / Conférence
  • Thumbnail
    Sharing Knowledge in a Shared Services Center Context: An Explanatory Case Study of the Dialectics of Formal and Informal Practices 
    Vieru, Dargos; Arduin, Pierre-Emmanuel (2016) Communication / Conférence
  • Thumbnail
    Innovative Solutions for Information and Knowledge Systems Security : A Total Quality Management Perspective 
    Arduin, Pierre-Emmanuel; Kabèche, Doudja; Sali, Mustapha (2017) Communication / Conférence
  • Thumbnail
    Insider Threats 
    Arduin, Pierre-Emmanuel (2018) Ouvrage
  • Thumbnail
    From Information System to Information and Knowledge System 
    Grundstein, Michel; Arduin, Pierre-Emmanuel; Rosenthal-Sabroux, Camille (2014-11) Communication / Conférence
Dauphine PSL Bibliothèque logo
Place du Maréchal de Lattre de Tassigny 75775 Paris Cedex 16
Phone: 01 44 05 40 94
Contact
Dauphine PSL logoEQUIS logoCreative Commons logo