Paper Number
2535
Paper Type
Short
Abstract
In response to the evolving technological landscape and organizational needs, Zero Trust (ZT) emerges as a promising alternative to the perimeter-based security approach. However, as an innovation, ZT represents a departure from the long-established understanding and culture of perimeter-based security. This shift may cause organizational concerns regarding when and how to ZT in organizations. To address these concerns, it is essential to establish strong legitimacy for ZT as a desirable and appropriate security management practice in the eyes of adopting organizations. This study identified four legitimacy types for ZT adoption, as well as key actors who play important roles in its legitimation process. Furthermore, a Delphi study at an industry level will be conducted to develop a taxonomy of legitimation strategies tailored for the identified legitimacy and actors. This study will contribute to the work on ZT legitimation strategies, which will in turn promote its adoption within organizations.
Recommended Citation
Zhou, Xuwei and Hsu, Carol, "Strategies in Legitimatizing for Zero Trust Security Model: Insights from A Delphi Study" (2024). ICIS 2024 Proceedings. 7.
https://aisel.aisnet.org/icis2024/security/security/7
Strategies in Legitimatizing for Zero Trust Security Model: Insights from A Delphi Study
In response to the evolving technological landscape and organizational needs, Zero Trust (ZT) emerges as a promising alternative to the perimeter-based security approach. However, as an innovation, ZT represents a departure from the long-established understanding and culture of perimeter-based security. This shift may cause organizational concerns regarding when and how to ZT in organizations. To address these concerns, it is essential to establish strong legitimacy for ZT as a desirable and appropriate security management practice in the eyes of adopting organizations. This study identified four legitimacy types for ZT adoption, as well as key actors who play important roles in its legitimation process. Furthermore, a Delphi study at an industry level will be conducted to develop a taxonomy of legitimation strategies tailored for the identified legitimacy and actors. This study will contribute to the work on ZT legitimation strategies, which will in turn promote its adoption within organizations.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.
Comments
06-Security