Stakeholders in Security Policy Development: December 2011
Stakeholders in Security Policy Development: December 2011
Stakeholders in Security Policy Development: December 2011
net/publication/254592256
CITATIONS READS
12 4,922
3 authors:
Atif Ahmad
University of Melbourne
84 PUBLICATIONS 1,160 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Sean B. Maynard on 12 June 2014.
Email:
a
[email protected]
b
[email protected]
c
[email protected]
ABSTRACT
The Information Security Policy (ISP) of an organisation is expected to specify for employees their behaviour
towards security, and the security ethos of the organisation. However, there are a wide range of opinions and
expertise that should be considered by organisations when developing an ISP. This paper aims to identify the
stakeholders that should be utilised in an ISP development process and how this may differ based on
organisational size. The research identifies from literature nine stakeholder roles that are suggested to be
required in an ISP development process. Contextual interviews are then used to validate these nine stakeholder
roles from a practical perspective.
KEYWORDS
Security Policy, Stakeholders, Information Security Management
1 INTRODUCTION
Organisations are continually having to protect themselves from a myriad of security threats which have been
shown to be on the increase (Dhillon 2007). Hu et al. (2007) suggest that an organisation, whilst having
technical security controls, needs to also have good managerial practices regarding security, in particular having
a good information security policy (ISP). “Undoubtedly the singularly most important of these controls is the
information security policy” (Hone & Eloff 2002, p.402). An ISP defines how information and related assets of
an organisation are protected from various threats that may impact on the accuracy, availability, integrity and
confidentiality of an organizations’ information (Doherty et al. 2009).
One of the concepts of ISP development that is generally agreed upon by researchers is the need to involve
multiple perspectives (Warman 1992; Szuba 1998; Swanson 1998; Dhillon & Torkzadeh 2001; Tudor 2001).
Having multiple stakeholders involved in ISP development will help to produce a more balanced policy that will
be applicable to the diverse stakeholders of the organisation, whilst still defining the security agenda of the
organisation.
Given the importance of ISP to an organisation and that multiple stakeholders should be involved in policy
development; two questions arise a) which stakeholders should be involved in development and b) when should
stakeholders be involved with development. This research aims at answering only the first of these questions:
which stakeholders should be involved in development. The second question will be dealt with in future
research.
In order to determine which stakeholders should be involved in ISP development a conceptual review of the
literature was undertaken. This was followed up by a number of contextual interviews with information security
experts to determine a practical perspective. This research reports on these procedures.
2 METHODOLOGY
The purpose of this paper is to investigate which stakeholders in organisations should be involved with the ISP
development process. Initially a conceptual study was undertaken that identified nine stakeholder roles that are
discussed extensively in the literature. Next, a series of contextual interviews (as defined by Holtzblatt et al.
2005) were undertaken to determine which stakeholders practitioner experts thought were important in ISP
development.
Experts were selected for this study based on the amount of experience they had in information security and in
particular whether they conducted ISP development. Identification of experts was obtained through contacts
provided by colleagues and through calling organisations to talk to information security managers. The full
process for this was to identify a security expert, to then make telephone contact, ascertain their suitability and
interest and to then conduct an interview. All interviews were recorded digitally, were transcribed and analysed
to gain an insight of their perceptions regarding stakeholder roles in policy development. The interview process
was conducted until saturation was reached. Table 1 summarises the experts interviewed.
Table 1: Contextual Interview Experts
Interviewee Job Title Industry Sector Years of Security Experience
Fred Manager IT Security Supply Chain 5 years
Greg Security Analyst Supply Chain 4 years
Hilda Security Specialist Automotive 7+ years
Inga Security Manager Financial Services 4 years
Participants were asked two main open ended questions: “How are ISPs developed in your organisation,
including who is involved with the development?” and “Which stakeholders should be involved with the
development, implementation and evaluation of security policies?”. The second question was asked later in the
interview, and elicited similar stakeholders to those previously identified in their description of policy
development.
In the following section each of the stakeholder roles will be described, and the results of the contextual
interviews will be presented.
From Table 2 it can be seen that many researchers discuss which personnel should be involved with the
development of ISP (Warman 1992; Szuba 1998; Swanson 1998; Dhillon & Torkzadeh 2001; Tudor 2001), or
the stakeholders who should be involved with security in general (Baskerville 1988). Each stakeholder role may
have involvement with ISP development at different levels, at different times and may have differing opinions
about the policy. Thus, it is important to include all possible stakeholders in the development process. It is
important to note here, that these are stakeholder roles, as opposed to jobs, and as such a particular individual
may take on more than one role. For instance in a small organisation a single IT manager may be employed and
it would be likely that they would take on the roles of ICT Specialist and Security Specialist during the ISP
development lifecycle.
Table 4 shows which stakeholder roles identified in the literature are also identified by experts as important to
consult in the development and quality assessment of the ISP. As can been seen in Table 4, the ICT Specialist,
Security Specialist, Business Unit Representative, Human Resource and Executive Management roles were
identified by all of the security experts as being required to be involved in the development and quality
assessment process. Fred states that senior management must be consulted “so they understand what we are
trying to do, not only in IT, but in other areas corporate wide”. This is in general agreement with the other
experts.
Table 4: Identified Stakeholder Roles by Expert
Stakeholder Role Fred Greg Hilda Inga
Business Unit Representatives
Executive Management
Human Resources
ICT Specialists
Security Specialists
Legal & Regulatory
Public Relations
User Community
External Representatives
Two of the stakeholders were not identified by one of the experts: Legal and Regulatory and Public Relations.
This may be because Inga’s organisation did not have these areas involved with the process, possibly due to the
“newness” of having a policy within the organisation as their policies were only 11 months old.
The External Representatives and User Community were only identified by two experts each. In the case of the
User Community, Inga is of the opinion that they, in large, shouldn’t have a say in the policy; “no input from
users is requested. Not every employee gets a chance to say if they do or don’t agree [with policy]”. Fred
stated that users are not consulted, and communication and enforcement of the policy is left for line managers to
indoctrinate their employees. External Representatives were identified by two experts (Hilda: External
Consultant, Inga: External Auditor). The other two experts did not see the need to have this in their current area
of responsibility.