Paper Number

2535

Paper Type

Short

Abstract

In response to the evolving technological landscape and organizational needs, Zero Trust (ZT) emerges as a promising alternative to the perimeter-based security approach. However, as an innovation, ZT represents a departure from the long-established understanding and culture of perimeter-based security. This shift may cause organizational concerns regarding when and how to ZT in organizations. To address these concerns, it is essential to establish strong legitimacy for ZT as a desirable and appropriate security management practice in the eyes of adopting organizations. This study identified four legitimacy types for ZT adoption, as well as key actors who play important roles in its legitimation process. Furthermore, a Delphi study at an industry level will be conducted to develop a taxonomy of legitimation strategies tailored for the identified legitimacy and actors. This study will contribute to the work on ZT legitimation strategies, which will in turn promote its adoption within organizations.

Comments

06-Security

Share

COinS
 
Dec 15th, 12:00 AM

Strategies in Legitimatizing for Zero Trust Security Model: Insights from A Delphi Study

In response to the evolving technological landscape and organizational needs, Zero Trust (ZT) emerges as a promising alternative to the perimeter-based security approach. However, as an innovation, ZT represents a departure from the long-established understanding and culture of perimeter-based security. This shift may cause organizational concerns regarding when and how to ZT in organizations. To address these concerns, it is essential to establish strong legitimacy for ZT as a desirable and appropriate security management practice in the eyes of adopting organizations. This study identified four legitimacy types for ZT adoption, as well as key actors who play important roles in its legitimation process. Furthermore, a Delphi study at an industry level will be conducted to develop a taxonomy of legitimation strategies tailored for the identified legitimacy and actors. This study will contribute to the work on ZT legitimation strategies, which will in turn promote its adoption within organizations.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.