Loading...

Media is loading
 

Paper Type

Complete

Description

The security of every organization is critical and should be proactively planned. The research field of security, workplace behavior, security safeguards, workarounds, and cybersecurity explores how organizations can effectively strategize and use adaptive security plans to minimize the security vulnerability of organizations. These solutions rely heavily on the technology adopted by organizations that seek to align with policies that safeguard their information assets consciously. However, despite several works in the literature on workarounds, the concept of workarounds that poses a security risk in an organization is still riddled with ambiguities. This review covers current research involving 28 articles across the Association for information systems (AIS) basket of eight conferences and other IS security-related journals. Our results identify four major categories that reveal the intersection of workarounds and security in the workplace from recent literature. We further discuss their implications and propose avenues for future research.

Paper Number

1830

Comments

SIG SEC

Share

COinS
Top 25 Paper Badge
 
Aug 10th, 12:00 AM

Workarounds from an Information Security Perspective: Literature Review

The security of every organization is critical and should be proactively planned. The research field of security, workplace behavior, security safeguards, workarounds, and cybersecurity explores how organizations can effectively strategize and use adaptive security plans to minimize the security vulnerability of organizations. These solutions rely heavily on the technology adopted by organizations that seek to align with policies that safeguard their information assets consciously. However, despite several works in the literature on workarounds, the concept of workarounds that poses a security risk in an organization is still riddled with ambiguities. This review covers current research involving 28 articles across the Association for information systems (AIS) basket of eight conferences and other IS security-related journals. Our results identify four major categories that reveal the intersection of workarounds and security in the workplace from recent literature. We further discuss their implications and propose avenues for future research.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.