Understanding Information Security
Understanding Information Security
Understanding Information Security
Strategy in Organisations
Craig A. Horne
BSc, La Trobe University, 1992
December 2018
ii
Abstract
The research topic under investigation in this thesis is information security strategy in
and a descriptive set of benefits that can be adopted after strategy selection and
approval.
used to support this digital transformation across the entire organisation. Yet, the
goals are frequently overlooked, creating security exposures and vulnerabilities. One
reason for this is a lack of attention paid to cataloguing and controlling valuable
information being used as a business resource. Others are that usage of emerging
borders, that security controls used to protect information can be expensive and
complex, and that organisational leaders may resist the implementation of security
controls due to a perception that they impede productivity. This then leads to
iii
approach to understanding their lived experiences with developing and using an
analyse the interview transcripts and their organisation’s information security strategy
organisational leaders choose from four main strategies when making decisions to
information security strategy. The implications of this are that organisations can
iv
Declaration
i. the thesis comprises only my original work towards the PhD except where
ii. due acknowledgement has been made in the text to all other material used,
iii. the thesis is fewer than 100 000 words in length, exclusive of tables, maps,
Signature:
v
Preface
• Some passages in this thesis have been quoted verbatim from published
papers where I was the primary author, with permission from the co-authors
and publishers. It is noted at the beginning of the relevant chapters where this
has occurred.
suggestions for this thesis and associated conference and journal articles, the
• There has been no work submitted for other qualifications or work carried out
researcher, who personally checked every word. The transition from raw to
clean transcription involved listening to the audio again and removing umms
and ahhs, replacing unintelligible sections with the correct words, removing
vi
Preface – Publications
vii
Preface – Acknowledgements
I would like to thank and acknowledge the efforts of my supervisor Dr. Sean Maynard
waded into the deep end with me, taking the time to explore and comprehend subtle
nuances in key areas. I was especially grateful for his open-door policy and
motivational support. Thanks also to my supervisor Dr. Atif Ahmad, who readily
I am grateful for mentorship along the way from senior scholars who have given their
time so generously. Many thanks to Leon Stirling, Rod Dilnutt, Richard Baskerville,
Justin Zobel, Graeme Shanks, Deborah Bunker, Axel Korthaus, John Lamp, Ella
Hafermalz, Henry Linger, and Julie Fisher for their guidance. Dr. Steve Versteeg
deserves credit as without him, I would not have commenced doctoral research in the
first place. Dr. Jeb Webb, Dr. Piya Shedden and Dr. Jay Jeong were always available
I would like to thank my parents Donald and Patricia for raising me to believe in
lifelong learning and always encouraging me to be the best I can. My sisters Nicole
and Sharon deserve credit for their excitement on this seemingly endless journey
whenever I gave them an update. Most importantly, my beautiful wife Dr. Michelle
Horne and sons Daniel and Edmund who have provided boundless love and support
throughout the many years it took to complete this research program. I thank them
for this opportunity to indulge my intellectual curiosity and hope they find as much
viii
Table of Contents
Declaration .................................................................................................................v
Preface...................................................................................................................... vi
List of Figures........................................................................................................... xv
1.4 Significance............................................................................................... 30
ix
3.1 Chapter Aim .............................................................................................. 73
x
7.6 Means of Representation ........................................................................ 260
xi
Appendix E: Example Transcript from an Interview ........................................... 326
xii
Glossary
Acronym Meaning
IP Intellectual property
IS Information systems
IT Information technology
US United States
xiii
List of Tables
Table 2.3. Thematic Map of Results from Literature Review of OrgISS ................... 68
Table 2.4. Information Systems Theories and Information Security Strategy ........... 71
Table 7.1. Open (Level 1) Codes Mapped to Category (Level 2) Codes ................ 261
Table B.1. Information Systems Theories and Information Security Strategy......... 310
xiv
List of Figures
Research................................................................................................................. 49
Figure 4.1. Summary of Common Platforms Used for Storing Information ............. 150
Figure 7.2. Conceptual Model of Organisational Information Security Strategy ..... 266
xv
Chapter 1: Introduction
expanding on key terms used throughout the thesis, giving some context to the topic
in order to categorise established lines of inquiry, identifying the problem with efforts
made in the area to date, establishing a singular aim of this research effort and the
scope of the study based on the limited resources available, explaining the
significance of the study in both theoretical and practical terms, and finally offering a
in a fluctuating market, expand the target market to include a global focus, and
increase delivery speed (Bharadwaj, El Sawy, Pavlou, & Venkatraman, 2013a). This
et al., 2013a). This exponential increase in the number of networks and systems that
Horne, C.A., Maynard, S.B., and Ahmad, A. 2017. "Organisational Information Security
Strategy: Review, Discussion and Future Research," Australasian Journal of Information
Systems (21).
Horne, C.A., Ahmad, A., and Maynard, S.B. 2016. “A Theory on Information Security,” The
27th Australasian Conference on Information Systems, Wollongong, Australia.
16
CHAPTER 1: INTRODUCTION
beyond the control of the information owner. Often, the value and importance of
Against the backdrop of an increasing need for information, there has been a
information (ACS, 2016; Ahmad, Webb, Desouza, & Boorman, 2019; Gupta &
Sharman, 2012). Information security threats for organisations are predicted to rise
annually in number and scale (ACS, 2016). Once a threat eventuates into a security
incident, organisational leaders often face hefty clean-up costs to restore their
organisations are currently estimated to total as much as $500 billion per annum
(ACS, 2016). Given the significance of these impacts, governments around the world
people and organisations to hold them accountable for securing their organisation’s
information. These factors mean that organisations should set an information security
In this study, the unit of analysis is the entity known as an organisational information
security strategy. The units of observation are (1) an individual research participant,
(2) organisations that engage in information security at the strategic level, and (3) a
document that purports to contain an information security strategy. Together, the unit
of analysis and the unit of observation form the population of the research enterprise.
The following is a description of some key terms that together are used throughout
this thesis. The focus in this thesis is on information security strategy, so each of
17
CHAPTER 1: INTRODUCTION
these words are individually described in turn, as they are later combined for the
1.1.1.1 Information
stored on various platforms such as paper, computer databases and even cognitive
media (people’s minds) (Ahmad, Ruighaver, & Teo, 2005; VonSolms & Van Niekerk,
2013). Organisations protect their information because it is used broadly for daily
operations and, depending on its sensitivity and utility, may even form the basis for
competitive advantage (Ahmad, Maynard, & Park, 2014b; Park, Ruighaver, Maynard,
& Ahmad, 2011; Porter & Millar, 1985). Information may have varying levels of value,
from very little to high, and should be classified accordingly. Classifications may then
be used as the basis for assigning access rights to employees (Ahmad, Bosua, &
Scheepers, 2014a). Classification labels then direct the type of security controls that
are assigned to protect the information, which includes technical controls which are
informal controls such security education, training and awareness programs and the
ensuing security culture that is developed as a result (Backhouse & Dhillon, 1996;
Information is not data, as data are considered to be raw facts and numbers. For
be data that has been processed to become meaningful, for example the map
latitude and longitude for a city (McKinney Jr & Yoos, 2010). For the purposes of this
thesis however, the word data is often used interchangeably with the word
information, because the research participants who provided the research data use
used, and eventually deleted (Tallon & Scannell, 2007). The lifecycle of information is
18
CHAPTER 1: INTRODUCTION
not enough however to explain decisions made to secure it, as it lacks the strategic
perspective.
information (Ahmad et al., 2005). Where the information is stored, for example
storage, changes the benefits and the risks from specific threats (Loh &
in the conscious brain (Dulipovici & Baskerville, 2007). Research subjects sometimes
used the word knowledge interchangeably with information, so for the purposes of
this thesis, where the term knowledge is used, the word information should be
include the type and location of IT infrastructure used to store it (Teece, 2000). This
assets is foundational and the primary perspective taken throughout this entire
thesis.
1.1.1.2 Security
information security, achieving a perceived secure state using risk management for a
19
CHAPTER 1: INTRODUCTION
planned implementation of technological controls (Da Veiga & Eloff, 2007; Webb,
perspective, information security has then advanced through a period that favoured
security culture, and then an age that advocated governance to counter fraud and
social engineering attacks (Da Veiga & Eloff, 2007). These advancements resulted in
information.
1.1.1.3 Strategy
Strategy is a concept that has been developed over centuries in the military and
business disciplines (Grattan, 2002). The word strategy originally came from the
strategy deals with the planning and conduct of campaigns, and the movement and
disposition of national forces. Strategy is the art of distributing and applying military
means, such as armed forces and supplies, to fulfil the ends of policy. In military
literature, strategy is the highest level of planning, with the next level lower down
termed operational, and tactical level below that (Bowdish, 2013). The tactics,
operations, which then support a nation’s strategic goals at the highest level. At the
strategic level, nations guide the facilitation and achievement of national goals and
objectives, using critical infrastructure and other national resources to achieve them
(Bowdish, 2013).
20
CHAPTER 1: INTRODUCTION
From the business literature, views on strategy abound (Drucker, 1958; Mintzberg,
1987; Quinn, Mintzberg, & James, 1988), however in one of the most highly-cited
strategic management books of the last century, three generic competitive strategies
1980). These generic competitive strategies form the basis of competitive advantage
using resources to drive profitability (widely defined as total revenue less total
expenses) (Barney, 2000; Grant, 1991; Porter, 1980). These strategies are used
within the business domain by organisations selecting one and then using it to guide
activities of the board and all staff in response to the competitive environment, in
Tan, Ee, & Phang, 2018). Preservation of the confidentiality, integrity and availability
control tools, and risk management (Ahmad et al., 2014a). Coordination of these
security strategy which is then used to organise the other security mechanisms
must also consider external environmental factors such as competition, suppliers and
21
CHAPTER 1: INTRODUCTION
information risks and controls are in balance” (Anderson, 2003, pp. 310). Information
information-related concepts and the systems it is hosted by (Moody, Iacob, & Amrit,
information over time diminishes resource utility and could potentially prompt the
Information security evolved to include non-technical aspects and has been defined
as the protection of information and the systems that it resides on (Whitman &
(McCumber, 1991; Posthumus & Von Solms, 2004; Siponen & Oinas-Kukkonen,
2007). Adding identification and authentication to this list of properties extends the
McFadzean, & Birchall, 2005). Other benefits that organisations can enjoy from
only (Antoniou, 2018; Bowdish, 2013; Dhillon & Backhouse, 2000). Computer
(VonSolms & Van Niekerk, 2013). Computer security goals are the confidentiality,
22
CHAPTER 1: INTRODUCTION
information (VonSolms & Van Niekerk, 2013; Whitman & Mattord, 2011).
Cyber security is a term that is used increasingly more commonly in recent times
is more extensive than information security and expands beyond it to consist of not
only the defence of information but also non-informational assets (Dutta & McCrohan,
2002; VonSolms & Van Niekerk, 2013). Cyberspace has been defined as “a time-
dependent set of interconnected information systems and the human users that
interact with these systems” (Ottis & Lorents, 2010, pp. 268). Cyber-security was
then further defined as not only the protection of cyberspace but non-informational
assets as well (Van Schaik et al., 2017). The cyber security goals and general
There has also been a considerable amount of research conducted into operational
areas related to information security, with a focus on improving human aspects with
Backhouse & Dhillon, 1996; Dhillon, Torkzadeh, & Chang, 2018). This approach
highlights the view that organisational information not only resides on ICT
is required at strategic level because “unfortunately, there has been very little
23
CHAPTER 1: INTRODUCTION
directors” (McFadzean, Ezingeard, & Birchall, 2006, pp. 4). More recently, there is
still a paucity of current research on boards and their governance to reduce security
breaches (Higgs, Pinsker, Smith, & Young, 2016). Extant research on strategy for
Research Background.
There are a number of ways that security breaches are perpetrated, including internal
attacks from trusted employees, external attacks from anonymous adversaries, and
physical attacks on the medium that stores the information (McFadzean, Ezingeard,
& Birchall, 2007). The effects of external threats can be demonstrated by Sony
Corporation, which was famously hacked in 2011. The PlayStation Network outage
was the result of an external intrusion on Sony's PlayStation Network (Dhillon, 2018).
The attack occurred in April 2011 and forced Sony to completely turn off the
confirmed that personally identifiable information from each of the 77 million accounts
appeared to have been stolen. The outage lasted 24 days and on May 23, 2011
Sony stated that the outage costs were $171 million (Dhillon, 2018; Garrie & Mann,
2014).
A famous example of a physical attack on information was the incident involving the
Bank of New York Mellon (BNY Mellon) in 2008. In February 2008, BNY Mellon sent
ten unencrypted backup tapes to an external storage facility on a truck. When the
storage firm's truck arrived at the facility, however, only nine tapes were still on
board. The missing tape contained social security numbers and bank account
information on 4.5 million customers. Coincidentally, the bank retrenched 1,800 staff
and received $3 billion in emergency relief funding from US Treasury later that year
24
CHAPTER 1: INTRODUCTION
To illustrate an insider attack, a famous example was when Edward Snowden once
revealed over a million classified documents in 2013 to various news agencies, which
he had copied whilst working as a contractor for the US Central Intelligence Agency,
global mass surveillance was called the most significant leak in US history
(VonSolms & Van Heerden, 2015) and as of 2015, international loss of trust in the
resulting in economic damage - serve to highlight the scale and scope of the
problem. The risks from these increasingly complex threats require the setting of a
novel information security strategy to counteract them (Maynard, Onibere, & Ahmad,
2018; Onibere, Ahmad, & Maynard, 2017). Effects from a security breach on
take place on social media such as LinkedIn. This can then lead to problems with
information availability, such as when a cloud storage vendor becomes bankrupt and
2010). The boundaries of modern storage platforms are obfuscated and porous, yet
25
CHAPTER 1: INTRODUCTION
disclose their significant information security breaches, the magnitude of which are
often surprising given the volume and sophistication of security controls at the
disposal of large organisations to prevent and respond to security incidents (Garrie &
Mann, 2014; Pilgrim, 2017). Often the identification and value of information are
warrant the attention of organisational leaders. One reason for this is a lack of
attention often paid to cataloguing and controlling key sources of information. Other
reasons are that usage of emerging disruptive technology can create porous network
borders, that security controls to protect information can be expensive and complex,
and that organisational leaders may resist the implementation of security controls
unclear what steps organisational leaders can take to reduce liability and impact in
event of a breach, an information security attack is the fault of the attacker. However,
might be seen as the fault of security specialists and leaders within an organisation.
The international standard for the governance of information security states that
organisational leaders who form the governing body are accountable for overseeing
strategy within an organisation (ISO/IEC, 2013). They can share responsibility for this
with executives and managers but ultimately, they are accountable for setting
strategy, properly funding information security efforts as well as ensuring that all the
necessary initiatives have been conducted to prepare the organisation for a possible
risk, liquidity risk, operational risk, and informational risk might be simply another
26
CHAPTER 1: INTRODUCTION
enlist the services of an outsource partner to assist with the storage and handling of
This relationship where executives assist the governing body in their decision-making
around the setting of information security strategy, rather than decisions being made
at an operational security manager level, is key and is the primary perspective taken
Further, organisations should then track their progress towards the achievement of
strategy for the security of their organisational information, given their unique
circumstances, or what the contents of a strategy might be. There are no clear
even claim to be cyber literate and the number drops to just 15 percent for co-
27
CHAPTER 1: INTRODUCTION
Research questions are constructed based on the problem and gaps that exist in
knowledge to date (Sandberg & Alvesson, 2011). Therefore, the initial research
question used to guide this research and the examination of extant information
is reviewed and defined during the academic literature examination. The aggregated
extensive search of the literature. To answer this research question, several sub-
The research first seeks to understand what an information security strategy is, in
relevant supporting theory. As well as its constituent properties, I also examine what
environmental conditions motivate the use of one and what value and benefits can be
enjoyed post-adoption.
Organisational leaders must take a lot into consideration when determining the most
appropriate selection. For example, they must consider the purpose and objects of
security strategy will dictate how it is selected, which will then dictate any other
supporting activities.
28
CHAPTER 1: INTRODUCTION
operational and tactical decisions as part of their job. This research investigates on
balance what usage best benefits the organisation, considering its purpose and
stakeholders.
This research will improve understanding of what an information security strategy is,
question is revisited again with a view to answering it based on the findings from the
discussion.
one. This investigation intends to uncover the factors and considerations that lead to
the selection of one information security strategy over another, as well as the benefits
The scope of this study includes analysing information security strategy as defined in
individuals who are accountable or responsible for securing information within their
security at the strategic level. The research subjects included both private and public
organisations, from medium to very large in size, in order to analyse differences and
similarities between them all. This study does not include empirical testing of the
29
CHAPTER 1: INTRODUCTION
legitimate outcome of the study” (Creswell, 1998, pp. 58). Theory building studies
Australia in terms of sheer numbers, they were not included in the scope of this study
due to a lack of available employees who were solely dedicated to the security
scope include the absence of investigation into the topic at operational level, or the
tactical level below that, to remain focussed on strategy and the interaction between
the highest governing body of an organisation and the executive layer, who then
strategy, not a strategic plan or framework of operational initiatives. Given that the
nature of the topic is security, questioning was restricted to broad strategic questions
Clark, 2004). This research examines information but did not examine data due to
the widely-held belief that people’s brain are platforms that host (i.e. remember)
information and knowledge not data (see Glossary for terms). It also did not examine
paper, databases, and computer servers (VonSolms & Van Niekerk, 2013).
1.4 Significance
The significance of this study is established via five outcomes (Evans, Gruba, &
Zobel, 2011). First, this qualitative study advances theoretical knowledge in the
information security strategy field beginning with the finding of a set of antecedent
30
CHAPTER 1: INTRODUCTION
and a third outcome is to identify the range of benefits that organisations can obtain
investigate this, and this type of generalisation is not included within this thesis.
from based on their unique challenges. Finally, a fifth outcome is a set of sequenced
together form a strategic plan, tailored for individual differences in organisation size
and ownership, although development of this type of strategic plan is not included
This thesis makes several contributions towards the body of knowledge on why
leaders should take steps to evaluate and select a strategy in practice. Specifically,
31
CHAPTER 1: INTRODUCTION
Organisations
The literature review from this research involved thematic analysis which identified a
set of core concepts organised by level and relationship. The levels included
information systems identified several concepts and these were expanded quite
The conceptual model of information security strategy depicts all abstract concepts
and their relationships, generalised from the data. The relationships are proposed
ones only without explanations. This model was then used as a representation of
strategy.
32
CHAPTER 1: INTRODUCTION
The theory on information security strategy states that there are four generic
strategies that guide the security of information within organisations. The depiction
along with organisational and environmental conditions, affect selection of the most
Security Strategy
This research provides guidance for practitioners in identifying all structured and
challenges with securing that information, and selecting a strategy to secure it. The
governing body then sets the most appropriate strategy, which can then be used to
information.
1.6 Overview
This section adumbrates the thesis structure, which has been kept simple. This
thesis comprises six main chapters, with this introductory chapter being the first. To
recap, chapter one introduced the topic, gave some context to situate the information
security strategy topic within the broader field of information systems, defined the
problem which gave some clarity about the motivation for the study, outlined a
singular aim of the study and the scope given the limited resources available,
explained the significance of advancing knowledge about OrgISS, and offered a high-
33
CHAPTER 1: INTRODUCTION
Chapter two continues by reviewing the extant literature related to OrgISS, describing
the key concepts and grappling with their conceptualisation. One of the contributions
are then used to search the information systems literature by surveying the OrgISS
topic, grouping key authors and their lines of argument, and identifying gaps in
knowledge. The knowledge gap-spotting confirms the neglected areas within the
Systems conference proceedings and a more developed version was then published
Chapter three articulates the research design and methodology, starting with the
grounded theory, which was initially exploratory in nature to allow for uncovering new
ideas about OrgISS. The data collection methods chosen were interviews,
observations and document analysis, which allowed for triangulation across multiple
Chapters four to six summarise the findings of the collection of primary data, to
provide supporting material from which to direct the subsequent discussion and
observations, and OrgISS documents, when they existed and were permitted to be
shared. The qualitative data sets are organised thematically after analysis and the
resulting information is described in relation to the aim of the study, noting any gaps
34
CHAPTER 1: INTRODUCTION
Chapter seven contains the main discussion, building on the findings drawn in the
the current information systems literature on information security strategy with the
findings from the data collection, elevating the discussion to a theoretical level. The
subsequent discussion details a model for OrgISS, which emerges from core
Chapter eight lists the conclusions drawn from the discussion, key findings, and
security strategy and a theoretical model of it. The thesis is then closed with
which include a list of the core papers analysed in the literature review, a list of
relevant theories from extant related work, the ethics approval statement from the
institutional ethics board, the interview protocol with questions used during data
relationships from the findings in chapters four to six, and a data structure that
35
Chapter 2: Research Background
For some of the world’s largest organisations, including governments and multi-
information security strategy, (2) themes related to information security strategy, and
(3) the yields and benefits that might be enjoyed post-adoption. A contribution from
identification of the gaps in literature that suggest possible launching points for a
research program.
Horne, C.A., Maynard, S.B., and Ahmad, A. 2017. "Organisational Information Security
Strategy: Review, Discussion and Future Research," Australasian Journal of Information
Systems (21).
Horne, C.A., Ahmad, A., and Maynard, S.B. 2016. “A Theory on Information Security,” The
27th Australasian Conference on Information Systems, Wollongong, Australia.
36
CHAPTER 2: RESEARCH BACKGROUND
The aim of this chapter is to examine extant literature related to information security
and for future research into the role that boards of directors may play in information
2018; Gupta & Sharman, 2012; VonSolms & Van Heerden, 2015). By broadly
reviewing the extant literature, a perspective will be established that can support the
organisations. This chapter commences with a critical literature review on the topic of
OrgISS. Papers from various researchers were analysed and evaluated before being
theory of OrgISS.
This chapter continues in four major sections. Initially I introduce OrgISS, discuss its
origins and existing definitions whilst expanding on some of its more central
research on how OrgISS is conceptualised, the level of analysis from which OrgISS
37
CHAPTER 2: RESEARCH BACKGROUND
is approached and contend with propositions for measuring the distinct elements of
Before searching the literature for references to information security strategy and
mapping the territory, a clear and precise definition of information security strategy is
required. This definition of information security strategy will then be used to guide a
indulgent departure from convention, the exploration of the term information security
Information security strategy is defined by Beebe and Rao (2010, pg. 330) as “the
pattern or plan that integrates the organisation‘s major IS security goals, policies, and
Park and Ruighaver (2008, pg. 27) define information security strategy as:
“an art of deciding how to best utilize what appropriate defensive information
38
CHAPTER 2: RESEARCH BACKGROUND
These authors believe OrgISS has been developed from the military literature and
therefore tends to be focussed more on how to deploy strategies than focus on what
goals the organisation is trying to achieve. The environment dictates that OrgISS
focus on protection of an individual employee rather than the whole organisation. The
leads them to the conclusion that OrgISS balances three dimensions which are time,
space and the decision-making process. The human factor means that OrgISS is not
Ahmad et al. (2014b) and Park and Ruighaver (2008) believe OrgISS can be used to
incrementally improve the quality of the information security program, however there
must be a strong link from the OrgISS to the organisational strategic plan to support
can take the form of one of several areas which include deterrence, prevention,
Hong, Chi, Chao, and Tang (2003) do not define OrgISS per se but assert that it is a
Sveen, Torres, and Sarriegi (2009) contend that an OrgISS is like any other business
39
CHAPTER 2: RESEARCH BACKGROUND
comparable to business strategy in that directs the process of compiling and using
resources. These resources however are used to create technical, formal and
managing risk. By explaining what an OrgISS is, Sveen et al. (2009) describe the
construct but have not provided a formal definition. Their insights are still useful
Carcary, Renaud, McLaughlin, and O'Brien (2016, pp. 24) describe information
information security strategy must be linked to the IT strategy and business strategy,
and the risk appetite. Another aspect is that the information security strategy must
These definitions give an insight into the difficulties with achieving unanimity on
conceptualisations from Park and Ruighaver (2008), Ahmad et al. (2014b) and Hong
et al. (2003) do not fit within either of these. There are many other researchers who
have used the term ‘information security strategy’ in their literature however they
shared amongst stakeholders (Beebe & Rao, 2010; Bowen, Hash, & Wilson, 2006;
40
CHAPTER 2: RESEARCH BACKGROUND
VonSolms & Von Solms, 2004), and (2) a dynamic process, to be followed by
Brotby, Bayuk, & Coleman, 2006; Flores, Antonsen, & Ekstedt, 2014; McFadzean et
al., 2006; Sveen et al., 2009; Van Niekerk & Von Solms, 2010). An understanding of
the differences between these interpretations will shed light on its theoretical nature
concepts such as goals, mission, size, policies and action sequences (Baskerville &
Dhillon, 2008; Beebe & Rao, 2010; LeVeque, 2006). In a process orientation, OrgISS
strategy-setting process can group actions taken according to either the end product
ultimately derived such as a strategic security plan, or the processes required such
as aligning OrgISS with organisational strategy (Baskerville & Dhillon, 2008). Finally,
characterise it in abstract terms only (Hong et al., 2003; Park & Ruighaver, 2008).
construct, that takes direction from organisational goals, and integrates resources
and capabilities for securing information to support the achievement of those goals.
now be used to guide a review of any extant literature articles that relate to the
41
CHAPTER 2: RESEARCH BACKGROUND
security efforts. However, a complete and methodical evaluation of OrgISS within the
information systems literature has not been accomplished. Therefore, this research
seeks to (1) examine what information systems researchers have analysed about the
OrgISS construct and (2) the OrgISS nomological network describing its various
My initial search for information security strategy was for manifestations of it in peer-
Information Systems basket-of-eight journals (Tarafdar & Davison, 2017). The search
consisted of articles that included the complete search string “information security
strategy” in English. I searched backwards to discover prior articles and forwards for
articles that cited seminal articles (Webster & Watson, 2002). I did not restrict the
search based on article age or grade of journal, preferring instead to examine each
artefact found for nuances, no matter how small, which could shed light on the
“information security” but included the word strategies (plural) instead, to facilitate an
investigation for example into whether use of the singular ‘strategy’ or plural
included articles that centred on information security but discussed an implicit aspect
42
CHAPTER 2: RESEARCH BACKGROUND
have important implications for motivating the use of an OrgISS; however, I did not
include any practice-oriented literature such as vendor white papers due to issues
with accessibility and peer-review process. Out of the results, 45 articles were
I then examined each article to explore how OrgISS relates to the article’s core
paradigm. The following four classifications stratify how central OrgISS is to each
article and is adapted from Roberts, Galluch, Dinger, and Grover (2012):
1. Implicit use of the term. Information security forms the article’s central theme
and strategy is implicit only. Information security strategy does not form the
central argument of the article, e.g. (Van Niekerk & Von Solms, 2010).
strategy explicitly in their findings or analysis, e.g. (Posthumus & Von Solms,
2004).
4. Forms the conceptual base for the paper. These articles are entirely
In summary from Table 2.1, 35 percent of articles (16 papers) that were collected
articles (12 papers) provided theoretical or conceptual support for developing the
logic of OrgISS. 18 percent of articles (8 papers) used OrgISS in some part of their
43
CHAPTER 2: RESEARCH BACKGROUND
From the previous sections, it could be perceived that OrgISS has not been widely
warranted. The following sections discuss in more detail the (1) conceptualisation, (2)
2.3.2.1 Conceptualisation
I examined what researchers understood the main conceptual context for the OrgISS
construct was. The three groups used for this construct are (1) as a plan, (2) as a
conceptualisation) and the role of OrgISS in the information systems literature. Out of
the 45 articles that were examined, 20 percent (9 papers) used OrgISS as the core of
the entire article. 78 percent (35 papers) gave neither explicit conceptualisation of
OrgISS. In terms of patterns, when OrgISS is used in the research question (row 3)
or forms the theoretical basis for the paper (row4), it becomes apparent that OrgISS
44
CHAPTER 2: RESEARCH BACKGROUND
Table 2.1. Information Security Strategy Conceptualisations and Role in Information Systems
Research
Neither
Plan Process Plan nor Total
Process
1. Implicit use of the term 1 1 14 16
2. Provides conceptual support 1 3 8 12
3. Used in research question or 0 1 7 8
hypothesis
4. Forms theoretical basis for paper 1 2 6 9
Total 3 7 35 45
plan or process, for the purposes of this thesis, the conceptualisation of information
security strategy will be adapted from the military and management perspectives of
guides the facilitation and achievement of organisational goals and objectives, using
conceptualisation of strategy from Porter (1980) in Chapter 1, there are a small set of
strategies that offer choices and can be used by organisations by selecting one and
For the purposes of clarification, in this thesis a group is a set of individuals who are
responsible for some aspect of security within an organisation. Also, in this section
where a paper discusses aspects of responsibility for the application of OrgISS at two
different levels, the higher of the two was recorded for the purpose of this analysis.
This is because the higher level is seen to be more complex, with greater relationship
interdependencies.
45
CHAPTER 2: RESEARCH BACKGROUND
(with 35 from 45 papers, or 78 percent) that scholars believe OrgISS is neither plan
or process.
standards for the protection of national assets, however this is outside the scope of
The majority of IS researchers consider that the level of analysis for information
security strategy is organisation-level, which will be the perspective adopted for the
the discovery of interrelated concepts (Strauss & Corbin, 1990). A number of the
papers used in this core review confusingly use the word ‘measure’ as an
arising from a threat to an asset (Ahmad et al., 2014b; Beebe & Rao, 2009; Park &
46
CHAPTER 2: RESEARCH BACKGROUND
Ruighaver, 2008). Two papers contained no mention of ‘measure’ at all (Hong et al.,
Of the papers that addressed the measurement of some aspect of OrgISS, the main
areas which were measurable included risk management, goal achievement and
of mapping assets and risk against likelihood and impact to create threat assessment
based on value, keeping in mind that the value of the security control must not
outweigh the value of the asset (Baskerville & Dhillon, 2008), Quality measurement is
and applying controls to deliberately reduce risk. Predicted threats are the known
threats that can be measured and controlled (Baskerville et al., 2014). Information
security strategy goals first, then determine the products of strategy, e.g. vision,
plan. An organisation’s vision statement articulates desired future state, whilst their
explain how an organisation converts their strategic security goals into an information
security strategic plan. Strategic plans have various components such as vision,
values, goals, rationale, plus activities for achieving those goals. Goal achievement is
measured by the activities undertaken to achieve those goals (Baskerville & Dhillon,
2008).
The foundations of many management frameworks are drawn from quality control
47
CHAPTER 2: RESEARCH BACKGROUND
security management that has been fundamental in information security strategy for
with key metrics. This draws management’s attention towards preventing threats.
Quality improvement is a strategic goal that can be gained through the measuring of
routine security tasks that together form a program for the prevention of security
security from measuring current threats and risks and applying controls to
number and percentage of stakeholders who engage with and use the information
security strategy (Carcary et al., 2016). There was no literature that purported to
(Cronbach & Meehl, 1955). For the purposes of this thesis, measurement will be
strategy exists or not, and if so, then whether it has been implemented via a strategic
other researchers to examine the information systems literature (Leidner & Kayworth,
qualitative content analysis on the literature of interest then listing meritorious ideas
from each article before organising them related groups (Cline & Jensen, 2004). To
conduct the thematic analysis, I first analysed 45 papers for their interpretation of
48
CHAPTER 2: RESEARCH BACKGROUND
OrgISS and then grouped key constructs according to similarities of themes. This
resulted in three distinct themes emerging from the analysis, which were
Antecedents are the precursor conditions that prompt an organisation to consider the
use of an OrgISS. Examples of affected organisations include military forces with top
secret files, pharmaceutical companies conducting experiments for clinical drug trials
and banks facilitating online trading. Constituents are the elements that make up the
activities to align organisational efforts. Yields are the benefits that can be enjoyed
grouping of the conceptual elements of OrgISS is drawn from the literature and
depicted in Figure 2.1. This depiction maps the concepts discussed in the following
49
CHAPTER 2: RESEARCH BACKGROUND
The sections below discuss these themes in more detail. The assessment is
focussed on conceptual elements that can be contributed from each journal paper
2.3.3.1 Antecedents
Antecedents are the precursor conditions necessary to prompt the use of OrgISS and
At an individual level, there did not seem to be any antecedents apparent in the
literature. It is impossible to make an exhaustive claim about this but certainly this is
At a group level, one OrgISS antecedent is the requirement for global ubiquitous
to uncertainty about the effectiveness of security controls, which security teams avoid
(Hofstede, Hofstede, & Minkov, 2010). Ongoing regulatory compliance burden is also
Extensive knowledge about the current applications being used by various groups
strategy, along with the inherent ability for organisations to adapt the use of
At an organisational level, antecedents for OrgISS that were apparent in the literature
50
CHAPTER 2: RESEARCH BACKGROUND
ownership of information assets of value is also a key driver towards the adoption of
OrgISS (Kelly, 1999). These information assets of value served as the basis for
also recognise the threat to the health and safety of their customers and employees
risk assessment can inform the scope and scale of an information security strategy,
2016).
implement security initiatives (Hu, Hart, & Cooke, 2007). Compliance is seen as the
Chang, & Kao, 2010; Kayworth & Whitten, 2010; Tutton, 2010). This regulatory
information security strategy (Lee, Kauffman, & Sougstad, 2011). Information security
infrastructure that the information resides on and deliver CIA to users. To expand, the
51
CHAPTER 2: RESEARCH BACKGROUND
internal requirements of an OrgISS are to address business issues and protect the IT
infrastructure, and the external requirements are legal and regulatory compliance and
adoption of standards and best practices are also required (Posthumus & Von Solms,
2004). As well as passing regulations for organisations to comply with stipulating that
monitor and reward or punish organisations for the regulations to be effective (Hou,
landscape are also required. OrgISS must be created at the same time as the
business strategy and depends on accurate needs analysis prior. Senior and middle
management are responsible for ISS creation and it is designed to support internal
inventoried, and values defined (Baets, 1992). The organisation’s market position in
through innovation, then managing its information better should improve security, but
(Majchrzak, 2014).
political pressure and economic sanctions are important preconditions that may
formal and informal controls that seek to deter and prevent information attacks
52
CHAPTER 2: RESEARCH BACKGROUND
technical controls against external threats that are seen to be increasingly more
(Cline & Jensen, 2004). Regulatory, political and legal compliance plus adoption of
standards and best practices motivate the use of OrgISS (Kim, Wang, & Ullrich,
2012; Posthumus & Von Solms, 2004). Standards exist which detail management of
information security which in turn could assist with OrgISS development (Brotby et
2.3.3.2 Constituents
Constituents are the central conceptual elements of OrgISS and emerged as a theme
Individual level
This section seeks to explore what role an individual has in contributing towards the
security depends on the weakest link which is typically an individual. To make it easy
for individuals to follow an information security strategy and reduce stress, it should
be simple to understand and not complex (Ament & Haag, 2016). This may represent
Group level
53
CHAPTER 2: RESEARCH BACKGROUND
This section examines the IS literature to discover the dynamics of groups working to
support the strategic use of information security. At a group level, the constituent
components of the OrgISS construct are varied and numerous. One is the
competitive advantage and can be either held in the human brain or in organisational
affect its reputation, revenue streams, remediation costs and productivity. One way to
non-core, and then gain benefits such as cost reduction by outsourcing the
management of the non-core information (Feng, Feng, Zhang, Chen, & Li, 2018).
knowledge and customer details. The information security strategy goals are to
culture and legal support (Ahmad et al., 2014a; Shedden, Ahmad, Smith, Tscherning,
OrgISS should guide the overall security budget for an organisation, to enable the
security staff group and their management to fund and implement security resources
that optimise security outcomes based on expense versus benefits (Anderson &
Choobineh, 2008). When using an OrgISS to allocate security budget to fund security
the technical aspects as well as the social or human aspects (Park, Na, & Chang,
54
CHAPTER 2: RESEARCH BACKGROUND
made by one layer of responsible agents affect decisions made by agents in other
layers and their communication is vital. OrgISS success depends on action taken by
alignment with policies and regulatory compliance efforts (Backhouse & Dhillon,
1996).
One essential element of OrgISS is a mix of technical, formal and informal controls to
resides on and deliver CIA to users (Beebe & Rao, 2009; Posthumus & Von Solms,
2004; Sveen et al., 2009). One of the effective controls that should be introduced at
and awareness program, along with clear governance processes for allocating
responsibility within the organisation (Alshaikh, Maynard, Ahmad, & Chang, 2018;
Maynard, Tan, Ahmad, & Ruighaver, 2018; Tsohou, Karyda, Kokolakis, &
the government industry, are examination of the types of data held, human
Prayudi, 2015).
and address not only the technical side of controls, but the human interaction
required ensure their effectiveness as well. OrgISS typically suffers from a lack of
trained employees can be seen as security assets as well, which lowers overall risk
55
CHAPTER 2: RESEARCH BACKGROUND
threats and therefore most of the content in an OrgISS is centred on controls that
mitigate risk from external threats. Information security policies are an important part
read and comply with the policies. Limited resources mean tough decisions must be
made about what controls will be put in place to mitigate threats and unfortunately
due to the most trusted advice to executives coming from technical people (Chief
Information Officer and below), technical controls are purchased instead of also
focussing on the social side of security (Taylor & Robinson, 2014; Van Niekerk & Von
Solms, 2010). OrgISS includes the capability to respond to attacks effectively, which
stems from supplementary forces creating a time buffer through the employment of
the breach from the central holding point (Burnburg, 2003). In order for an
Information systems solutions underpin business products and services and are
must focus on how to maintain competitive advantage in the face of rapidly changing
outdated might not be the best use of valuable resources and instead organisations
could consider the use of innovative emerging ICT solutions (Lee et al., 2011). These
considerations fall into two categories: 1. Business alignment, which includes all
management, and 2. Technical alignment, which includes the use of emerging IT and
its integration into existing ICT infrastructure. Security is paramount in the decision
56
CHAPTER 2: RESEARCH BACKGROUND
about whether to use emerging ICT to fill business alignment gaps and enable
Organisational level
The organisational level is where most influence can be exerted internally to achieve
OrgISS can be used to incrementally improve the quality of the information security
program. There must a strong link from the OrgISS and the IT strategy to the
business strategic plan to support it (Drnevich & Croson, 2013; Dutta, 1996). The
OrgISS needs to be completely aligned with the business strategy to ensure that
security needs can be met whilst the business strategic and operational objectives,
chief amongst them being availability of applications and infrastructure, are also met
(Fibikova & Mueller, 2012). This allows strategic plans to incorporate appropriate
(Carcary et al., 2016; Flores et al., 2014; Hou et al., 2018; Tu, Yuan, Archer, &
Connelly, 2018).
compartmentalisation and layering. These generally fall into one of two focus areas:
time (pre- or post-attack) and space (inside or outside the organisation’s network).
Senior business sponsorship of the security function is also required. (Ahmad et al.,
Information security strategy fits within the context of information security governance
within the boardroom and the public sector (Fitzgerald, 2016). An OrgISS is the
collection of security activities that support the overall agency strategic plan and they
57
CHAPTER 2: RESEARCH BACKGROUND
different levels in various divisions and funds them based on merit. This OrgISS is a
alignment with agency mission, and awareness and monitoring of external threats
OrgISS protects only the more valuable information assets in order to reduce
administering sanctions for security policy violations (Da Veiga, 2016). It is important
develop policies that are equally dynamic (Baskerville & Siponen, 2002). Identity and
and response activities (Ahmad, Hadgkiss, & Ruighaver, 2012; Ahmad, Maynard, &
Shanks, 2015; Kelly, 1999). Corporate knowledge assets can then be inventoried
Information security strategy has been described as a balance that can be actively
environment. This choice is then termed the information security strategic posture.
these actors need to equally adhere to the policies and strategy adopted by the
parent organisation.
should the review and analysis of a serious incident suggest this is warranted. The
58
CHAPTER 2: RESEARCH BACKGROUND
increasing complexity and sophistication of dynamic, targeted attacks over time will
security strategy must adhere to the principles and practices of either the prevention
on one over the other can result in a reduced number of security incidents or
individual contractors, then they need to equally adhere to the security policies and
organisation’s environment through the careful selection of internal controls, and can
use situational crime prevention to introduce a deterrent option within the risk
centred in risk management, identifying controls to mitigate known threats (Da Veiga
& Eloff, 2007). Better alignment of the business strategy with the information security
controls (Tu et al., 2018). For organisational-wide risks, an OrgISS must lower risk by
59
CHAPTER 2: RESEARCH BACKGROUND
and can include intangible loss as well as tangible. Reducing risk lowers anticipated
the network, compute and storage ICT infrastructure, then securing applications and
et al., 2003).
The operational objectives of OrgISS are to protect information assets from the risk
OrgISS is a top-down process that links with the business processes, both physical
and technical, and strategy. Standards exist which detail management of information
security that could assist with ISS development. OrgISS consists of policies that
promote the business goals and strategy. It couples with governance to provide
boundaries and procedures for employees along with their roles and responsibilities.
SETA must be constantly provided to staff, along with adequate resourcing to ensure
success. The staff includes on-site and off-site professionals, managers, executives,
60
CHAPTER 2: RESEARCH BACKGROUND
provides input to the OrgISS along with business processes, risk assessments, and
classification, controls for people, process and tools, linkage with the business
performance measurement, and SETA (Brotby et al., 2006; Da Veiga & Martins,
OrgISS must consider the production, sales and maintenance phases involved in an
organisation’s product or service lifecycle. The reason is that security risk must be
objectified as an entity that is shared between manufacturer and consumer and both
must decide their risk posture to allow them to make smarter procurement decisions
constantly revised and takes into consideration the organisation’s risks and culture,
2002).
Responsibility for ISS, including its policies and standards, is held by the business
61
CHAPTER 2: RESEARCH BACKGROUND
OrgISS requires the attention and approval of the board of directors and Chief
Executive Officer (CEO) because they are accountable for its outcomes (Da Veiga,
2015). Members of the governing body put an OrgISS into effect by using corporate
communicate with and direct management in the organisation (Kinnunen & Siponen,
2018). Information security policies can direct the setting of an information security
through which the directors can shape employee behaviour by the policies
information security policies that have been set (Da Veiga & Martins, 2015;
Ruighaver et al., 2007). Information security strategy is set by the senior executives
in an organisation and includes a set of policies that are guided by the advocated
corporate values and based on tacit assumptions typically set by the company’s
founder.
62
CHAPTER 2: RESEARCH BACKGROUND
OrgISS is perceived as both a passive entity, i.e. a plan, and an active entity, i.e. a
process. OrgISS should include SETA early in the process of its development to
assist with OrgISS selection to solve key issues. A crucial point around OrgISS is
ownership and people. Directors are accountable for security and delegate the
responsibility for the development of OrgISS to managers who then consider how the
employees interact with it. Information security strategy is used by the governing
body to direct the efforts of executive management. The process is that executive
management develop the information security strategy, the governing body then
OrgISS requires the attention and support of the board of directors and CEO
because they are accountable for its outcomes. They affect OrgISS by using
communication is then required back from management to the board and executive
in the form of regular progress reports. This allows for incremental quality
improvement (ISO/IEC, 2013; McFadzean et al., 2006; Posthumus & Von Solms,
2004; Vroom & Von Solms, 2004). OrgISS must consider corporate governance,
frustration. OrgISS must also include top level sponsorship, liaison with the business,
build on known threats and begin with a preventative approach, leverage best
monitoring, governance structure, SETA and providing those responsible for security
63
CHAPTER 2: RESEARCH BACKGROUND
and business continuity, insurance, audits and new business units and groups (Cline
& Jensen, 2004). Without a focus on business continuity, it is entirely possible than in
directly into quantifiable revenue loss. This loss is quantifiable and needs to be
prevented with an OrgISS. The organisational goals, strategy and policies are
required to support services such as confidentiality, integrity and availability plus also
accountability, authenticity and reliability (Van Der Haar & Von Solms, 2003). The
way that management focuses on risk influences the strategic approach taken to
mitigate identified risks, and the controls then implemented against various threats
Information security strategy needs to focus on people and process not only tools, as
these are often the main causes of security failure by hampering the protection of
information (Da Veiga, 2015). Security culture lowers risk to information assets by
reducing insider threats from malicious and non-malicious employees, which can
have economic benefits (Da Veiga & Eloff, 2010; Hua & Bapna, 2013b). OrgISS
and advocates that effectiveness is derived from sanctions being believed to be swift,
severe and certain (D'Arcy & Herath, 2011; Kankanhalli, Teo, Tan, & Wei, 2003).
Inter-organisational level
success and factors that influence this are examined in the following section. At an
64
CHAPTER 2: RESEARCH BACKGROUND
an emphasis on systems security which lowers the cost because it makes the work of
an auditor easier and quicker, therefore considerably lowering the time and materials
OrgISS facilitates information warfare, which forms just one layer of a conflict with an
adversary. The four layers of a nation attack are political, which then escalates to
economic sanctions, then information warfare and finally full kinetic warfare
(Baskerville, 2010). Some information assets may be resources that create strategic
security incident, then their integrity may be lost forever, along with the value of the
advantage (Feng et al., 2018). When a security incident of this nature is disclosed to
the market, there are implications for the organisation’s share price (Campbell,
pressures have increased the requirement for this defensive process (Datta &
Chatterjee, 2008). OrgISS must include an organisation’s business and cyber policy
of origin, which must synchronise with that of governments from other countries. The
the event of an attack. Shouldering the responsibility for lowering attacks will involve
system for measuring attacks however the benefits are that the world will be a safer
place (Kim et al., 2012; Majchrzak, 2014). OrgISS can be used by a country to align
defensive resources and capabilities to protect the country from a cyber-attack (Min
65
CHAPTER 2: RESEARCH BACKGROUND
2.3.3.3 Yields
Yields are the goals achieved from the successful use of OrgISS and emerged as a
theme in the information systems literature after conducting the thematic analysis
robust program to actively shape and improve the information security culture within
an organisation leads to transforming individuals from weak links into strong allies for
there were no apparent benefits arising from OrgISS. At an organisational level, the
availability (Ahmad et al., 2014a). another yield is that high quality information is
OrgISS is about deciding the overall security budget for an organisation, to enable
security staff and their management fund and implement security resources that
optimise security outcomes based on expense versus benefits (Huang, Hu, &
Behara, 2008). These security resources include plans, staff, procedures, guidelines
intelligence and risk appetite. Security budgets are bounded by expected probable
Loss prevention efforts should also guard against revenue loss (Van Der Haar & Von
Solms, 2003). Performance reporting is another goal but requires tracking of key
auditing and customer service (Booker, 2006). Finally, the protection of competitive
66
CHAPTER 2: RESEARCH BACKGROUND
assets and physical critical infrastructure assets. Yields can also include the
disablement of adversary CI, reduce foreign military abilities and impair foreign
organisation’s security needs and the requirement to lower impacts from security
incidents, and can also lower the risk of adverse litigation outcomes and achieve
(Brotby et al., 2006). An important benefit is share price protection and shareholder
value (Campbell et al., 2003; Hovav & D'Arcy, 2003). Regulatory compliance avoids
adverse sanctions by ensuring external agencies are kept fully informed (Banker et
al., 2010). OrgISS yields also include retaining customers, security incident
prevention, improved business processes and public reputation (Cline & Jensen,
and tarnished reputation (Datta & Chatterjee, 2008; Oshri et al., 2007). Refer to
Several gaps in knowledge have appeared through the conduct of this research. At
an individual level of analysis, there appears to be very little research conducted into
contributors to various aspects of the OrgISS construct but there does not seem to
67
CHAPTER 2: RESEARCH BACKGROUND
Table 2.3 presents a thematic map of OrgISS derived from the results of the literature
review, as described in the previous sections, and summarises the key themes
found.
68
CHAPTER 2: RESEARCH BACKGROUND
The role of prior theory and theoretical frameworks can be useful in qualitative
studies and sensitivity to these can help identify key concepts that have been
study (Corbin & Strauss, 2008; Wiesche, Jurisch, Yetton, & Krcmar, 2017). Both a
theory data collection (Urquhart & Fernandez, 2013). Identification and use of related
theoretical frameworks however should not inflexibly dictate the terms of original
qualitative research but rather offer a departure point from which the burgeoning
study can begin (Corbin & Strauss, 2008). Researchers have even been advised to
only briefly review previous theoretical research to reduce undue negative impact on
creative development of concepts and relationships and confirmation bias (Corbin &
Strauss, 2008; Gioia, Corley, & Hamilton, 2013). Accordingly, I review information
systems theories within the context of information security strategy, and the findings
follow.
In contrast to deductive studies that seek to ‘prove’ or disprove theory, the aim of
and properties from data and this is assisted by theoretical comparisons (Corbin &
Strauss, 2008). Reviewing extant theories allows the researcher to understand the
concepts of ‘information’ or ‘security’ for example, so that this understanding can then
with existing concepts (Birks, Fernandez, Levina, & Nasirin, 2013; Corbin & Strauss,
2008). Theoretical comparison occurs before the data is collected to improve later
literature related to the security of assets against threats, an examination of all these
69
CHAPTER 2: RESEARCH BACKGROUND
is beyond the scope of this thesis thus the scope of this thesis is limited to research
within the information systems discipline (see Section 1.3 Aim and Scope). Larsen
and Eargle (2018) maintain a web-based resource that lists theories which are
disciplines (Larsen & Eargle, 2018; Straub, 2012). It is designed for both doctoral
students and senior academics to assist in developing their theoretical sensitivity and
has been used to support research published in top journals (Markus & Saunders,
2007). As such, it formed the basis of my search for theories in information systems
that potentially relate to information security strategy. The 104 theories currently
listed on this website were searched for the keywords: asset, resource, threat,
terms found during the thematic literature review. This search yielded a list of 34
theories (see Table B.1 in Appendix B: Theoretical Background for the complete list)
which were then reviewed for relevance and limitations in the context of information
security strategy, and a resulting summary of theories is listed in Table 2.4, with
70
CHAPTER 2: RESEARCH BACKGROUND
apparent there are no theories where the philosophical stance relates directly to
information security, much less directly to information security strategy. This gap
71
CHAPTER 2: RESEARCH BACKGROUND
This literature review surveyed the literature, mapped the territory and identified
gaps. It illustrated various aspects of information security strategy and key themes
explains the information security strategy construct and its relationships. Additionally,
This review of this literature was used to inform the development of initial questions
for interviews, as described more fully in the following chapter. For example, some of
the yields that can be gained from employing an information security strategy (as
listed in Table 2.3) are reduction of litigation risk, share price protection, regulatory
protection. These factors together form the basis for a question about yields in the
72
Chapter 3: Research Approach
This chapter explains the proposed research approach for investigating the research
topic information security strategy. There are many interpretations to be made when
important to articulate the philosophical stance taken when investigating the research
question because if there is a mismatch between the research foundations set in the
literature review and the approach taken to investigate the phenomenon, then that
This chapter aims to explain every part of the research framework, from ontological
reality all the way through to the data collection methods and analysis procedures.
This chapter responds to the research question that was articulated in the chapter
one, describing the most appropriate approach to create new knowledge and fill the
gap. It begins with an introductory overview of the design for this research
programme, giving an account of each of the areas in the overall research process
understanding how the reality of the subject matter can be assessed, the
philosophical stance that ties together the epistemology and the methodology, a
73
CHAPTER 3: RESEARCH APPROACH
lead to the building of a theoretical model of information security strategy. For the
explanation of observed or experienced phenomena” (Gioia & Pitre, 1990, pp. 587).
To achieve the research aim, this research program will investigate what an
information security strategy phenomenon is, how one is selected, how one is used,
The design of research begins by identifying the research problem, which must be
significant enough to warrant the research effort to resolve it (Evans et al., 2011).
The research aim is written to solve the research problem, which sometimes
examines how two variables affect one another, or instead develop a deep
form (i.e. there can only be one aim in a research project) (Evans et al., 2011). The
research hypothesis is sometimes an informed claim that two variables listed in the
research aim either affect each other in a particular direction or have no effect (null
hypothesis), but sometimes can simply offer a proposed understanding (Evans et al.,
hypothesis and directs the overall research activity (Bono & McNamara, 2011; Evans
et al., 2011).
The research question must be compatible with the nature of the research design.
That is, if the research hypothesis posits the causality of a variable change, then the
research question must allow for variable measurement more than once (introducing
another variable (Bono & McNamara, 2011). Alternatively, qualitative studies may
instead search for a deeper understanding on a topic, which is what this thesis offers.
74
CHAPTER 3: RESEARCH APPROACH
This section describes the overall process for conducting research into this topic. The
theory-building in this study begins with phase 1a literature review (see Figure 3.1)
which surveys the literature on the topic and orders the results via a simple
how the existing knowledge is organised to help identify the gap in knowledge that
this thesis fills. As well, phase 1a identifies the supporting theoretical base that
guides the subsequent model formulation, which in this case is contingency theory.
The data collection consists of three parts, phase 1b conducting 25 expert interviews,
phase 1c recording field notes whilst observing research participants during the
strategy documents, when they existed and could be anonymised and released to
me. Before any data collection was conducted, ethics approval was sought and
obtained from the institutional ethics review board and a copy of the approval letter
The data from phases 1b, 1c and 1d were analysed and interpreted to develop a
75
CHAPTER 3: RESEARCH APPROACH
developed and refined using constant comparison during the conduct of the data
collection. After careful analysis, the model is abstracted to the level of a substantive
Social science differs from natural science which has long been the bastion of
scientific research. Where natural science lends itself, for example, to the discovery
developing theory within a humanistic social context, without the benefit of highly
controlled environments. These two philosophical approaches have been at odds for
centuries amongst the academic community and the following section provides an
overview of how these approaches affect this study on information security strategy.
identifying the timeframe that the research should be completed within, along with an
After identifying the ontological reality of the topic, alignment of the research
whether the research topic can be objectified and measured or not (Gray, 2013). This
note that elements of multiple epistemologies and philosophical stances can overlap
(Creswell, 2003). Methodologies are selected based on their broad tendency to align
with particular philosophical stances but this alignment should not be interpreted as a
76
CHAPTER 3: RESEARCH APPROACH
There are two types of timeframes, shorter and longer, and these correspond to two
study types which are cross-sectional and longitudinal respectively (Yin, 2011). A
cross-sectional study takes a snapshot of the research topic by collecting data at one
point in time, typically using a survey methodology (Gray, 2013). A longitudinal study
allows collection of data at multiple points in time and so can measure changes in
The purpose of the research also plays a part in the selection of a research
framework. There are four types of purpose which are named exploratory,
with nothing and explores a topic related to a problem. This exploration can involve
outcome (Gray, 2013). Exploratory studies are purely inductive in nature without a
guiding hypothesis or research question and are not appropriate for PhD research
between subjects (Gray, 2013). One of the weaknesses of descriptive studies is that
they do not delve into why an event has occurred (Gray, 2013). Explanatory studies
go one step further and do ask ‘why’ and ‘how’ questions (Gray, 2013). Explanatory
studies explore and attempt to uncover correlation and causality (Gray, 2013).
social reality from subjects (Gray, 2013). Interpretive studies typically employ
77
CHAPTER 3: RESEARCH APPROACH
There are many definitions of what information systems is and one holds that it is
both a science and a profession (Lee & Baskerville, 2003). Another definition
purely a social information system based on human interaction (Shanks, Arnott, &
Rouse, 1993). One paper that reviews 22 different definitions of information systems
and organisational use of information technology for the purposes of conducting work
(Alter, 2008). Another definition is that information systems is not just information
technology, nor simply the people who use technology, but rather it is what emerges
from people using technology and any associated processes and norms that arise
(Paul, 2007). This last definition is used by this thesis because technology,
information, and processes arose as important concepts related to the topic during
Information systems has its own set of assumptions about relevant topics and
2001). Applied research examines existing knowledge and practices to look for ways
to improve them, using objective and systematic approaches (Shanks et al., 1993).
This social science orientation has implications for the design of research in
information systems.
Options for the various elements of the research framework can now be assessed
against the research question and the most appropriate methodology can be
78
CHAPTER 3: RESEARCH APPROACH
selected. The purpose of research is to develop reliable and valid new knowledge in
(Evans et al., 2011). These processes and research techniques link to abstract
issues in philosophy (Neuman, 2014). The abstract philosophical issues involve what
moral pressures affect research, what the ethical boundaries might be, why research
is conducted and how I know whether a good research outcome has been achieved
appropriate methodology and method (Neuman, 2014). The very nature of the
At some stage of the research process, the researcher must identify a research
approach and the decision about when this adoption occurs determines whether the
researcher begins with a proposed model and then conducts research to prove it or
otherwise, then the approach can be said to be deductive (Yin, 2011). The deductive
approach tests a hypothesis, and the principle is then confirmed, refuted or revised
(Yin, 2011). In deductive studies, it is common for the conceptual elements that form
79
CHAPTER 3: RESEARCH APPROACH
observing whether the hypothesis has been falsified or not (Gray, 2013). It is worth
acknowledging that perhaps no IS research is purely deductive and that there are
differing views on what defines a deductive study (Lee & Baskerville, 2003, 2012;
If the researcher begins by collecting fragmented data and then collating and
analysing it to build a proposed model, then the approach can be said to be inductive
(Corbin & Strauss, 2008). This approach means the final model can be said to have
been ‘discovered’ from common themes emerging from the data (Strauss & Corbin,
1990). The research is not completely directionless, as the topic was chosen in the
beginning which then guides the data collection process; however it does not set out
to prove or disprove a theory (Gray, 2013). Deductive and inductive processes are
compatible however and can be used in the same research project at different stages
(Gray, 2013). There are various perspectives on what defines induction and
generalisation (Lee & Baskerville, 2003, 2012; Tsang & Williams, 2012; Williams &
Tsang, 2015).
This research follows an inductive approach. The reason for this is the lack of
existing theory on information security strategy that could be used to guide research
attempts or build upon. Extant guidance on the nature of the topic was not universally
review is conducted, a research question posed, data is then collected and the
results examined and analysed, and a model is proposed from the results – steps
3.4.3.2 Ontology
Ontology has been defined as “an area of philosophy that deals with the nature of
being, or what exists” (Neuman, 2014, pp. 94). It is the study of being, what exists
and whether it forms part of reality (Gray, 2013). The many beliefs that have been
80
CHAPTER 3: RESEARCH APPROACH
developed through the centuries on ontology are beyond the scope of this thesis to
list, however most philosophers ascribe reality to one of two main ontological
positions, which can be termed realist and nominalist (Neuman, 2014). Realist
philosophers believe that the world contains objects that simply exist, which can be
(Crotty, 1998; Neuman, 2014). These objects are visibly formed with identifiable
philosophers believe that all data are viewed from the eyes of human researchers,
who bias the data by subconsciously applying their own tacit values, preconceptions
and cultural beliefs (Neuman, 2014). The data emerges in a changing world to form
meaning that can be formless, chaotic and even absent (Gray, 2013).
From the literature review in Section 2.2.1 Information Security Strategy: Plan or
Process?, consensus was that the form of information security strategy was
contentious, as some scholars thought that it was a static plan and others thought it
was a dynamic process. There was disagreement about whether information security
three ways of measuring it uncovered in the literature, which measured its risk
management, goal achievement and quality, however none of these measures the
entire information security strategy construct but rather some singular aspect of it.
This inability to grapple with the nature of the form of information security strategy
gives us clues as to its reality. Does information security strategy exist independently
81
CHAPTER 3: RESEARCH APPROACH
Nominalist ontology assumes that any external reality is always being interpreted by
humans based on their previous experiences and biases (Neuman, 2014). These
subjective cultural beliefs cause the object to be viewed through a lens that colours
the subject’s perception of the topic (Neuman, 2014). Information security strategy is
often documented, the contents of which are organised into categories and patterns
documents have been written, then an information security strategy for that
organisation now exists in corporeal form. These factors are consistent with this
3.4.3.3 Epistemology
Epistemology has been defined as “an area of philosophy concerned with the
creation of knowledge” (Neuman, 2014, pp. 95). It focusses on how the knowledge is
created and what are the most appropriate ways to make it truthful (Neuman, 2014).
and their meaning can exist without humans even being aware of them (Crotty, 1998;
Gray, 2013). Perception using the senses is the only truthful form of validation of
reality, therefore the only way to build knowledge (Crotty, 1998). Objectivism relies
on the senses to perceive objects and validate them to construct reality and build
written, it did not exist. If no object exists, then the senses cannot perceive it.
discovery of truthful ideas (Neuman, 2014). Aggregating and organising these truthful
82
CHAPTER 3: RESEARCH APPROACH
ideas allows the discovery of laws or principles that are based on reality (Neuman,
2014). This research can either work deductively by testing ideas about reality
Subjectivism is where meaning is not derived from the interaction of the subject with
the object (like in constructivism) but rather where subject assigns meaning to the
object (Crotty, 1998; Gray, 2013). The object offers no contribution to the subject
when meaning is derived or imposed but rather the subject constructs meaning from
their values and beliefs (Crotty, 1998; Gray, 2013). Subjectivism dictates that
meaning is assigned to the object and the object makes no contribution towards the
has been documented, then it exists and does have meaning. The document-object
Constructivism is where social reality is created from a subject’s interaction with the
world (Gray, 2013). Since research subjects are interpreting their thoughts and
actions when interacting with the researcher who is also interpreting, the researcher
cannot then generalise to make claims that are true for all people in all situations,
and results might be difficult to reproduce (Crotty, 1998; Neuman, 2014). The
researcher can only make generalised findings about specific individuals in specific
83
CHAPTER 3: RESEARCH APPROACH
If an information security strategy is written and therefore materially exists, then this
has been constructed whilst being written. Whether this constructed reality is purely a
whether it arises through some form of interaction with the security aspects of
Constructivism contends that meaning is not discovered as per objectivism but rather
constructed based on a subject’s interaction with the world (Corbin & Strauss, 2008;
Gray, 2013). That is, meaning exists as a result of the partnership between subject
and object, which differs based on culture and era (Crotty, 1998). Meaning in the
world is not created; it is constructed subjectively using the world and pre-existing
objects in the world. In terms of information security strategy, the building blocks are
organisations and the information assets they own, the organisational environment
and all its accompanying threats, and the controls organisational staff can apply to
methodologies and methods that are used to conduct the research (Crotty, 1998). It
explicitly states the assumptions that guide the choice of a methodology (Crotty,
1998). The stances include positivism, interpretivism, critical inquiry, feminism and
postmodernism, amongst others (Crotty, 1998; Gray, 2013; Neuman, 2014). There
are three main stances common for studies in social science, which are positivist,
interpretivist and critical, with the first two being most popular and influential (Gray,
84
CHAPTER 3: RESEARCH APPROACH
Shanks et al., 1993). The broad range of definitions and understandings about the
nature of information systems has resulted in debate about the most appropriate
have suggested four main paradigms to anchor research, namely (1) radical
humanist, (2) radical structuralist, (3) interpretivist, and (4) functionalist (see Figure
3.2). Choice of a paradigm guides the philosophical stances adopted in the research
(Gioia & Pitre, 1990). Given the nature of information security is more oriented
towards uniform regulation than towards radical changes, radical humanist and
radical structuralist can be ruled out for the purposes of this research.
85
CHAPTER 3: RESEARCH APPROACH
about a causal effect from their relationship, tested using statistical measures (Burrell
& Morgan, 1979; Gioia & Pitre, 1990). Given existing variables in information security
strategy from the literature are scarce, and the topic information security strategy
seems to have a strong social reality to it, then the functionalist paradigm seems
the intended direction for this research (Burrell & Morgan, 1979; Gioia & Pitre, 1990).
support theory developed within it, such as the interpretivist assumption that human
agency is central to the construction of rules for structuring activities (Gioia & Pitre,
1990).
The positivist stance has been around the longest and appears in the majority of
relevant published papers (Neuman, 2014; Shanks et al., 1993). Positivism holds that
meaning exists externally to the researcher and can be factually measured by what is
researchers aim to produce results that are seen as objective facts (Gray, 2013).
Criticisms of positivism include that theory can also be developed based on what is
have also disputed the claim that objective facts are produced from positivist
research because theories cannot be proven, they can only be disproven (think of the
famous case of the black swan) (Gray, 2013). There are variations of views about
what positivism is and what many IS scholars assign to (say) “positivism” may not be
“positivistic” in the light of the philosophers who constituted, for example, logical
86
CHAPTER 3: RESEARCH APPROACH
positivism, which was a variation of positivism that argued that only claims verifiable
through direct observation or logical proof are meaningful (Siponen & Tsohou, 2018).
unknown social structures, values and assumptions are having undue influence on
the research results (Crotty, 1998). The main premise is that powerful social entities
skewed in their favour (Gray, 2013). Critical inquiry investigates values and
assumptions to challenge social structures and power relations that unjustly oppress
groups. Given that the aim of information security strategy is to protect organisational
information, the aim of critical inquiry does not seem relevant. Positivism dictates that
meaningful social reality exists externally to the researcher and that observing it is
the only way to measure it (Gray, 2013). Observing information security strategy
causes a power imbalance which distorts knowledge distribution and social reality,
however the difference is that the oppression applies only to women (Crotty, 1998).
This affects the choice of research approach and methods because in particular,
seen as compatible with feminism because the female researcher can make explicit
her assumptions and values when interacting with the object (Gray, 2013). Given that
there has been no indication in the academic literature that information security
strategy is affected by gender, then a feminist approach will not be taken in this
research.
87
CHAPTER 3: RESEARCH APPROACH
with its own ambiguous meaning and values (Gray, 2013). The literature on
information security strategy does not appear to be based on the postmodern values
2014).
object and subject (Crotty, 1998). The relationship is formed as the subject
1998; Gray, 2013). Interpretivism has a number of varieties which include symbolic
creating meaning where the subject interacts with the world to derive meaning about
an object from the interaction (Gray, 2013). Thus, the meaning is developed from the
subject’s perspective, which the researcher needs to take into account when deciding
subject engaged within that social reality (Gray, 2013). Ethnography on the other
hand is also focussed on the culture of social reality however the topic is viewed
where social reality is taken to exist independently of the subject or researcher (Gray,
2013). Since culture and social reality are taken to exist naturally, they can be
88
CHAPTER 3: RESEARCH APPROACH
processes of the researcher biasing the results (Gray, 2013). Hermeneutics contends
that social reality is too complex to be measured through scientific observation so the
researcher must interpret first-hand to fully understand the topic (Gray, 2013).
Naturalistic inquiry considers that there are multiple social realities that must be
accounted for during the research process, the results of which are constructed to be
nominalist ontology and asserts that reality occurring in the natural world is different
to reality occurring in the social world, requiring different methods to assess them
(Gray, 2013; McFadzean et al., 2006). These methods need to be unique, individual
and qualitative to account for the subjective lenses through which the object is
viewed by the researcher. This seems consistent with information security strategy
have a full understanding of the pressures that are applied to that organisation’s
information from its environment and internal stakeholders. The practitioners have
balancing these threats with what they perceive is an adequate level of security
89
CHAPTER 3: RESEARCH APPROACH
security research with a study of motivations and decision-making for the security of
A methodology is a plan of action that informs the choice of method in practice, which
links back to the desired research outcome (Crotty, 1998; Gray, 2013). The
methodology offers a rationale for the choice of method and how it is employed
considers that the truth exists independently in the world or whether the truth is
Other factors to consider are whether the researcher adopts a deductive or inductive
heuristic inquiry, action research, case study, discourse analysis and feminist
are difficult if not impossible to eliminate (Gray, 2013; Shanks et al., 1993).
90
CHAPTER 3: RESEARCH APPROACH
experiences and interactions with the topic by the research subjects (Shanks et al.,
phrases related to the topic, transforming them into theoretical themes, before
reintegrating the themes into a general description of the topic (Gray, 2013). The
research topic and the weaknesses are the subjectivity of the results, lack of data
and variables (Gray, 2013). They collect data from a smaller cohort of a population
and then typically generalise the analysis results as representative of the population
(Shanks et al., 1993). The data are either qualitative or quantitative in nature and
gathered via interviews or questionnaires. Surveys are then analysed and qualitative
data are often coded to allow quantitative techniques to be used (Gray, 2013). Given
researcher bias affecting the questions when being written. A strength of this method
Action research is where the researcher actively engages with the organisation which
critically reflective (Shanks et al., 1993). The strength of action research is the
practical nature of the research results and can use structured quantitative or
deductive approach (Gray, 2013). The weaknesses are that the subject data results
are typically highly subjective, the researcher biases the study indelibly, and
91
CHAPTER 3: RESEARCH APPROACH
Heuristic inquiry is a process where the researcher poses a research question based
on an identified personal problem and then employs active methods to assimilate and
participate in the problem area, with the intention of inductively uncovering insights
Case studies typically collect data on a research topic from a sample organisation or
group of organisations (Yin, 2013). Case studies are exploratory in nature to uncover
discovered concept. The strength of case studies is that they allow for insightful,
population and secondly, researcher bias subjectively affecting what data are
collected (Shanks et al., 1993). Case studies have confusingly been called a method
Grounded theory accepts that the normal manifestation of social reality in practical
Corbin, 1990; Yin, 2011). Grounded theory usually begins with an open-minded
collection of data from social contexts representing reality and then codification of the
data to categorise emergent themes that can then be said to be ‘grounded’ in reality
Aside from these common methodologies, there are other methodologies that are
simulation, which is applicable when the researcher knows the two variables under
investigation but is unsure of how the two will interact with each other. By developing
a model of the two variables and changing them in a simulated environment, the
92
CHAPTER 3: RESEARCH APPROACH
researcher can study their interaction. The downside is whether the model precisely
Conceptual studies elicit data from research subjects that are entirely subjective in
nature (Shanks et al., 1993). Conceptual studies avoid empirical data and allow
strengths are that it allows for critical thinking and creative new ideas. The
weaknesses are that researcher bias could distort the research subject questions
approach to data collection and analysis. Grounded theory is flexible and can be
of the research participants and the grounded theory aspects guide the techniques
for data collection, analysis, and presentation. This section will describe
phenomenology, then grounded theory, in more detail then finish with a detailed
Interpretive social science, often called qualitative research, has a variety called
2014; VanScoy & Evenstad, 2015). Although there are many variations of
there are two main branches, descriptive and interpretive (Creswell, 1998; VanScoy
93
CHAPTER 3: RESEARCH APPROACH
1989). Examining the lived experience of research subjects therefore forms the basis
under investigation and the meaning behind them, which is why phenomenological
studies look to capture multiple lived experiences where the subject perceived an
object as reality and then search for structured meaning within the common essence
objects such as pictures, text, and notes in their entirety, breaking them into parts to
understand meaning segments, then recombining the parts into one profound, deep
may not gather data solely from people, for example by asking about lived
objects, for example reading the text in a document and reflecting on what the intent
94
CHAPTER 3: RESEARCH APPROACH
1989). It explicitly makes clear the suppositions and assumptions of both the
research subject and the researcher, which is important for a topic that is not well-
defined such as information security strategy (Shanks et al., 1993). The weaknesses
are the subjectivity of the interpretations of the data, unreliable data from research
Phenomenological studies typically use the same data collection procedures as non-
participants, making observations, and jotting down field notes (Yin, 2011). The data
conducting a thematic analysis (Yin, 2011). The main point with phenomenological
studies is that they are qualitative research studies that study human experiences
with phenomena of interest in the real world and they resist the use of previously
identified concepts or labels that might distort the researcher’s perceptions of the
There are five major procedural areas that warrant the attention of a researcher
intending to conduct a phenomenological study and these five areas are all
1. The idea of epoche is central to any study in phenomenology, where the intent of
95
CHAPTER 3: RESEARCH APPROACH
preconceived ideas and notions about the topic away from the study. This is to
ensure that, as much as possible, the researcher truly gets a picture of the topic
from the subject’s perspective without the researcher’s biases distorting the data
(Moustakas, 1994).
2. The researcher writes questions for the study that explore the lived experiences
of the subject.
3. The researcher collects data from participants who have actually experienced the
phenomenon under investigation. These data are typically collected via long
interviews with additional field notes made by the researcher during the conduct
of the interview. The typical number of interview participants ranges from five to
same across methods. The steps are to disassemble the data, group the data
5. The study ends with the reader of the report understanding the single, unifying
construct that unites the experiences from all the subjects (Creswell, 1998).
strong interaction between data and theory, to support a claim that a proposed theory
is built and grounded on the data (Urquhart, Lehmann, & Myers, 2010). It was
originally developed by Glaser and Strauss (1967) to move social research away
from the functionalist paradigm and more towards the interpretivist paradigm (Burrell
& Morgan, 1979; Urquhart et al., 2010). It was famously developed further by Strauss
and Corbin (1990) and Charmaz (2008), adopted widely, to the point where grounded
theory was once labelled a common feature of qualitative studies (Miles &
96
CHAPTER 3: RESEARCH APPROACH
The reason that grounded theory has been selected as a methodology for this thesis
is that, to answer the research question, the lack of existing theory on information
security strategy meant that theory building was required using cogent analysis.
Senior scholars in information systems have suggested that GTM is appropriate for
recent review of GTM in information systems discipline shows that of all the articles
in information systems that are theoretical papers adopting GTM, there are ten
theoretical model or theoretical rich description) (Wiesche et al., 2017). Of these ten
theory articles, nine used the “Anselm Strauss” variant of GTM with only one using a
“Barney Glaser” variant (Wiesche et al., 2017). Accordingly in this research, I also
adopt a Straussian approach to GTM use, specifically the approach, techniques and
procedures prescribed in Corbin and Strauss (2008). The Straussian approach also
allows for a literature review to be conducted before data is collected (see Chapter 2
considered, which is practical for doctoral researchers (Strauss & Corbin, 1994;
Thornberg, 2012). The reason for this is that “familiarity with relevant literature can
enhance sensitivity to subtle nuances in data” (Corbin & Strauss, 2008, pp. 37).
97
CHAPTER 3: RESEARCH APPROACH
phenomenology criteria and grounded theory techniques to evaluate the data to set a
precedent.
Background in this thesis) before the collection and analysis of research data
(Chapter 4: Findings in this thesis) if the selected methodology for this research is
grounded theory, where scholarly dictum would prescribe delaying the review until
after data analysis to avoid biasing the researcher (Glaser & Strauss, 1967). This
delaying approach was not taken in this research because (a) a literature review was
understanding of extant knowledge, and all of these reasons are perfectly reasonable
biases can be effectively performed through the careful adherence to the prescriptive
3.4.6 Methods
A method is a technique or procedure that can be used to gather research data and
observation, interview, focus group, case study, life history, narrative, visual
98
CHAPTER 3: RESEARCH APPROACH
The distinction between qualitative or quantitative research and the decision about
which to use is made at the methods level, not at the epistemological or philosophical
stance level (Crotty, 1998). Researchers should accept that whatever epistemology
(Crotty, 1998). Methods are grouped as qualitative or quantitative and this fluidity of
choice only applies to the methods chosen, not to the choice of epistemology or
Methods can also be mixed instead of simply aligning with one research
epistemology and methodology (Gray, 2013). Reasons for this include the fact that
the researcher may need to respond to multiple research questions in the study, data
may need to be collected from multiple sources which are different in form, and to
allow the strength of one method to cover the weakness of another so that the study
overall is stronger (Gray, 2013). This last combination of methods, which is used to
check and establish internal validity in studies by analysing a research question from
creates a research outcome that is more rich, robust, comprehensive and well-
There are four main types of data collection activities, which are (1) interviewing, (2)
observing, (3) collecting and examining, and (4) feelings (Yin, 2011). Of these, there
are three main methods used to collect the data in this research program, which are
The researcher learns a lot about the topic under investigation in the process of
collecting the data, and can allow these experiences to shape the structures that
develop during data analysis (Polkinghorne, 1989). For this reason, it is essential that
only the researcher who participates in the data collection analyses the data and so,
99
CHAPTER 3: RESEARCH APPROACH
in this study, interrater reliability using the assistance of other researchers to increase
Before the data collection methods are described, a brief note on the expected
difficulty with collecting security data from organisations where I am not a trusted
difficult than in other disciplines because it is intrusive and there is a general mistrust
matters (Kotulic & Clark, 2004). It is also problematic to get organisations to adopt
the completed research into their practice (Siponen & Baskerville, 2018). Previous
Clark, 2004). A slow, cautious style is advised for research programs in insufficiently
on a sensitive topic (Kotulic & Clark, 2004). Based on this advice, I anticipate
difficulty with recruiting a large number of subjects, such as could be used for a
survey or questionnaire.
The primary method selected is interviews, long enough to investigate the topic in
depth, to last 30-60 minutes but sometimes to last up to a few hours, which are to be
audio-recorded and transcribed (Polkinghorne, 1989). The ideal target for the total
1989). The focus of the interview is on the lived experience of the subject with
themes in the research topic, not focused on the person themselves (Polkinghorne,
1989). The qualitative aspects of the interview seek to elicit the subtly-nuanced
aspects of any description the subjects impart in their sentences, not what the
100
CHAPTER 3: RESEARCH APPROACH
subject reflects should have happened or what they thought was theoretically
possible (Polkinghorne, 1989). The best way for me as the researcher to avoid
prematurely categorising answer data into theories and asking follow-up questions
that are misguided is to directly ask the subject for real examples of what they
Structured interviews are often precisely scripted through the use of pre-planned
participants (Yin, 2011). To achieve this uniformity, the interviews often involve
for comparison between answers. Qualitative interviews differ in that they are loosely
structured based on the overall research direction set by the researcher (Yin, 2011).
The interview questions are open-ended to allow for variability in the respondent’s
answers and follow-up questions may be interjected by the researcher (Yin, 2011).
Structured interviews can therefore be said to seek meaning from the researcher’s
difficulty lies in engaging with directors and executives on the topic of information
security, as research shows that this is difficult to achieve (Kotulic & Clark, 2004).
Given executives are time-poor and likely to ignore questionnaires, the most
productive method to engage with subjects and maintain their attention is interviews.
With the five major procedural tenets of a phenomenology methodological study from
the previous section in mind, an interview protocol was developed and can be viewed
includes questions that probe the subject’s understanding of the topic, written in a
101
CHAPTER 3: RESEARCH APPROACH
affecting the data. There are also questions that ask the subject for examples of
sample of research subjects were carefully selected to include people who purport to
placing them at the strategic level and ensuring they have some real-life experience
with the topic. They were asked about this when signing the participation consent
form as they were required to agree with the following sentence: “I have some
To develop and refine phenomenological interview questions, the method that will be
used is to follow a procedure where the first step is for me as the researcher to reflect
on the topic and then brainstorm a list of questions that are on-topic and thorough
(Colaizzi, 1978; Gioia et al., 2013). The second step is to conduct a few pilot
interviews and modify the questions after each interview based on dimensions that
were omitted from the initial list or discovered during interviews (Colaizzi, 1978; Gioia
et al., 2013). This may sometimes lead to the rewording of the research question,
al., 2013).
The data analysis steps include disassembling the data, grouping the data into
experience, as described more fully in the following section about data sources. This
Observing is a valuable method of data collection because the researcher can sense
and perceive the subject and topic with their own eyes, unfiltered by the subject’s
102
CHAPTER 3: RESEARCH APPROACH
perceptions (Yin, 2011). This observing technique allows the researcher to apply
their own reflections of the interview to the topic, which, depending on the level of
experience of the researcher, is just as valid as the data collected from research
subjects (Yin, 2011). Clearly this form of primary data is highly subjective, which
under investigation however simply being aware of this requirement offers some level
recording notes during the conduct of an interview may increase their level of
apprehension about what is being recorded, however this apprehension could also
result from being informed that the interviews are audio-recorded. I contend that any
potential apprehension could result in some level of acquiescence bias or halo effect
this case information security strategy artefacts (Yin, 2011). Although these
documents may be collected from a library or online sources, they are typically
collected in the field and can include such abstract topics as an organisation’s
manner requires the researcher to attempt to understand both the author’s original
intent and also their own perceptions while reading the documents (Polkinghorne,
1989). Advantages include that data from literary works often offer profoundly
(Polkinghorne, 1989).
103
CHAPTER 3: RESEARCH APPROACH
permission to access them. The other difficulty with this method is the vast size of the
documents, as some not only contain the organisation’s strategy, but it’s strategic
plan for implementing the strategy, which can run over 100 pages. Therefore,
collecting documents will not always be possible from every research subject and
(Polkinghorne, 1989). The researcher can then examine all these instances of
subjects interacting with the research topic and tease out structures, based on what
that the research subjects reflect on their own lived experiences when engaging with
the research topic, not report the experiences of others as consciousness and
consequent perceptions may be distorted (Polkinghorne, 1989). This places the onus
on the researcher to construct questions for the interview that do not allow the
subject to wander off-topic and give scholarly definitions or the experiences of others
(Polkinghorne, 1989). There are three main sources of data that researchers can
draw upon during collection, which are (1) self-reflections from personal experiences
with interacting with the research topic, (2) the reflections from research subjects who
have interacted with the research topic in the past, and (3) artefacts that embody
There are four main qualitative research activities that access sources from which to
collect research data, which are (1) interviewing, (2) observing, (3) collecting and
examining, and (4) feeling (Yin, 2011). Collecting data from multiple sources is
evidence, which strengthens the validity of the study (Gioia et al., 2013; Yin, 2011).
104
CHAPTER 3: RESEARCH APPROACH
Triangulation of data occurs when multiple sources converge on the same conclusion
Data collection by sensing feelings was not used in this study. Feelings refers to the
practice of the researcher reflexively examining their feelings during the course of the
data collection to detect any resonant or discordant intuitions that may affect, for
(Yin, 2011). This primary data needs to be triangulated but may provide insights into
the research topic that are not available from other sources (Yin, 2011). Some of the
interviews were conducted via recorded phone call so without face-to-face contact,
The data analysis phase is the most important stage of an interpretive study because
this is when the essential structures and the unifying relationships in the research
topic are uncovered (Polkinghorne, 1989). Importantly, the subject’s experiences are
not nebulous or nondescript, rather they are naïve and ordered, full of meaning.
During data analysis, the researcher’s role is to bracket out preconceptions and
The following is a description of the three data sources selected for this study and
their method relationship; interview transcripts from conducting interviews, field notes
from observing interviews, and documents for collection and examination. The next
explanation of the data collection and analysis procedures for each type of data.
Interview transcripts are written recordings of interviews that have taken place
between the researcher and subjects. Interpretive studies typically use other people
105
CHAPTER 3: RESEARCH APPROACH
as the primary data source of lived experiences with the research topic
(Polkinghorne, 1989). The major benefit of this approach is the avoidance of using
only my own reflections while developing an understanding of the topic, which would
create a risk of “subjective bias” (Polkinghorne, 1989). Data in the form of transcripts
from interviews with subjects is coupled with data in the form of self-reflections to
Field notes are data collected by observing research subjects and passively forming
(Polkinghorne, 1989; Yin, 2011). Although I could not observe all things at all times
within an organisation, I could be selective about when and what I observed and so
can take field notes during interviews to record my observations (Polkinghorne, 1989;
Yin, 2011). Observing participants will to some extent affect the participant’s actions
and their actions may influence my thoughts, all of which affects the data collected
(Polkinghorne, 1989; Yin, 2011). The field notes are highly subjective based on my
as the primary form of data. I do not intend to use field notes to record the interviews
verbatim but rather to record insights and thoughts I have during the interviews,
based on the research subject’s answers. They are also used to identify any
bracket out the biases that I bring to the study and understand the phenomenon
Collecting and examining documents and artefacts from the field can be an
106
CHAPTER 3: RESEARCH APPROACH
security policies and procedures, which are captured in documents (Yin, 2011).
Although costly to collect and examine in terms of time, the exercise will result in
primary data (Yin, 2011). Combining the collection and examination of documents
with interviews also serves to speed up the interview, as the researcher should not
have to continually interrupt the subject to ask for clarification on names, titles and
First and foremost, interviews are the most significant source of data for this study. A
slow, interpersonal-style of data collection method was selected, which was semi-
structured interviews with open-ended questions (Yin, 2011). The interviews are
semi-structured in that a set of questions guide the format of the interview, however
shaping the question, and keeping the phrasing of the questions neutral to reduce my
personal biases colouring the participant’s answers (Polkinghorne, 1989; Yin, 2011).
personal contacts on the basis that they hold responsibility or accountability for the
security strategy, thus this was a form of theoretical sampling (Wiesche et al., 2017).
The organisations are from a mix of government, business and educational sectors to
provide a full range of descriptions of the phenomena (Polkinghorne, 1989). The data
is to be collected from both public and private organisations, from medium to very
large in size, to triangulate sources and improve research validity (Creswell, 2003).
The interviewees are drawn from personal contacts and from referrals from contacts,
107
CHAPTER 3: RESEARCH APPROACH
population features but rather how specific the description of the topic essence might
must be made in so as to dispel any doubts in the reader’s mind that the
for generalising are based on stratifying the sample of research participants so that
they are representative of the types of people to whom the findings hold
(Polkinghorne, 1989).
Before the interviews begin, I will deliver a uniform speech on the collection and
out of the final transcripts. The participants are informed that the interviews will be
audio-recorded and are asked to sign informed consent forms prior to the interview
commencing. Once the recording has begun, the participants are to be reminded that
the interview is being recorded and asked to confirm verbally that they agree with
this. The venue for conducting the interviews may vary based on availability and
rapport, from a quiet office setting to a loud café. The interviews are designed to be
oriented (Flint, Woodruff, & Gardial, 2002). The data collection focuses on
Observations will be made during the course of the interviews and recorded in field
notes. Before each interview, I create printouts of the research questions and use
them as the basis for the field notes, spacing the questions out to create room for
notes on the paper. I annotate the top of each sheet with the participant number to
108
CHAPTER 3: RESEARCH APPROACH
identify it. Then when I ask each question, I make notes when the answers are
unusual or unexpected. Not every answer from the participant will yield an interesting
response.
participants who undertake a research interview. During the interviews with research
Q: “May I please get a deidentified copy of the document for further analysis?”
This request is combined with a verbal statement that reiterates that the document
will be held securely within the university for a period of five years following the date
of the last publication from the research data and then destroyed.
Data analysis should ideally begin immediately after the first interview has been
completed, to identify related concepts and begin to refine interview questions for the
next interview (Corbin & Strauss, 2008; Glaser & Strauss, 1967). This is not always
possible, simply due to the impracticalities of interviewing people; for example, a few
security strategy which were identified during the literature review were used to
109
CHAPTER 3: RESEARCH APPROACH
Coding is the process where data are disassembled, inspected, conceptualised and
then integrated to form a cohesive theory (Strauss & Corbin, 1990). The process
examines raw data and abstracts key parts of them to a conceptual level and there
are various stages to coding (Corbin & Strauss, 2008). Open coding is the first stage
of examining primary data and then breaking them up into concepts according to
ideas or themes that are related to the research topic (Corbin & Strauss, 2008;
Glaser & Strauss, 1967; Wiesche et al., 2017). Using open coding to analyse the
results allows for the appearance of unexpected themes (Gioia et al., 2013; Strauss
& Corbin, 1990). One way to approach this is to begin with a list of codes identified in
the literature review and then revise them as the data are examined (Corbin &
Strauss, 2008; Miles & Huberman, 1994). Every statement from a research
of concepts will grow quite quickly right from the beginning, perhaps leading to
hundreds of concepts. The data should be coded so that they are preserved in the
Although there are many options, the two main ways to analyse data, as espoused
by many qualitative researchers, are questioning and constant comparison (Corbin &
Strauss, 2008). Questioning refers not to asking questions of the participant but
rather of the data collected from the participant, examining particular phrases or
described in the data for similarities and differences and groups them as distinct
concepts accordingly (Corbin & Strauss, 2008; Wiesche et al., 2017). The aim is to
incidents in data are compared to concepts occurring outside the research, might
also be used if the data are unclear as to what they represent (Corbin & Strauss,
110
CHAPTER 3: RESEARCH APPROACH
security strategy during data analysis. The interviews are transcribed and analysed
after each is completed, which allows for the interview questions to be modified
Other common techniques used to analyse data include examining various meanings
of a word (Corbin & Strauss, 2008). This may become quite important in this
research because for example the literature review has revealed some authors using
the word strategy (singular) and other authors using the word strategies (plural) in the
as flip-flop, using personal experiences, identifying red flags, emotions and time are
Regardless of the techniques used, the intention is to break the data into smaller,
more manageable chunks, examine the data for the ideas or the essence contained
within, and then apply a conceptual label to the text (Corbin & Strauss, 2008). These
labels can then be compared with data from other sources for similarities or
differences.
At a practical level in open coding, every interview is audio recorded and then
features such as individual and organisation names that are inadvertently self-
disclosed throughout the course of the interview, remove any profanity, remove
umms and ahhs, and reconfirm unintelligible sections. I then import the transcripts
into the qualitative analysis software tool NVIVO and manually code the content into
nodes, which are key concepts identified in the data. The field notes completed while
111
CHAPTER 3: RESEARCH APPROACH
observing interviews are manually reviewed for interesting insights with the research
topic in mind. The field notes are reviewed at the end of each interview for
completeness and to also allow for some reflexion on the research topic. The field
notes from observing each research participant are used to both improve the
cumulative understanding of the research topic and to also improve the interview
questions, when they caused difficulty or uncertainty when eliciting a response from
the participant. The information security strategy documents are manually inspected
for clues about the organisation’s fixation on themes arising from information security
The second step is axial coding, where all the concepts that have been created may
start to appear similar or different to each other (Gioia et al., 2013). Axial coding
requires the researcher to relate concepts with other concepts to create categories
(Corbin & Strauss, 2008; Wiesche et al., 2017). The concepts can be merged if
similar and thus the total number of concepts can be reduced to a more manageable
concepts can then be labelled (still using participant terms) to make identification
easier. In axial coding, the researcher can apply their own intuition, knowledge and
experience to theoretically group the concepts by theme (Corbin & Strauss, 2008;
Gioia et al., 2013). This can then affect the subsequent interviews as the researcher
may modify research questions based on what has been uncovered so far (Gioia et
al., 2013). The researcher then identifies whether the themes that have been
uncovered can be treated as concepts that serve to describe some aspect of the
topic information security strategy (Gioia et al., 2013). Concepts that don’t appear to
ambiguity”) warrant further attention (Corley & Gioia, 2004; Gioia et al., 2013).
Concepts that do appear to be well described in the extant literature (i.e. have
112
CHAPTER 3: RESEARCH APPROACH
“optimal distinctiveness”) become apparent quite quickly (Gioia et al., 2013; Gioia,
Price, Hamilton, & Thomas, 2010). At some point, there will be no new concepts or
themes added after interviews and the study will have reached “theoretical
The third step is selective coding, which is a coding step that identifies only those
concepts related to the core category (Glaser & Strauss, 1967). The fourth step is
“coding for process”, which is a coding step that identifies the relationships between
The final step, theoretical integration, is to cycle through all the terms, themes,
dimensions, properties, and the extant literature to assess whether the concepts
discovered have been documented previously (Gioia et al., 2013). This step
compares both generated data and also extant theoretical literature at the same time
(Alvesson & Kärreman, 2007; Gioia et al., 2013). As noted in the previous section,
there will be no attempt to increase validity through triangulation using the assistance
step, the researcher must cognitively analyse concepts as they emerge, consider
their relationships and properties, and document insights in the form of memos
(Corbin & Strauss, 2008; Wiesche et al., 2017). The final step is to publish findings
by writing papers or journal articles (Corbin & Strauss, 2008; Wiesche et al., 2017).
This concludes the steps that will be used in the data analysis. The next step after
the results have been analysed and reported in the Findings chapter is to generate
an inductive theoretical model that is grounded in the data. This model will contain
113
CHAPTER 3: RESEARCH APPROACH
This study intends to improve trustworthiness of findings from analysis of the data
through several aspects. First, the focus of this study should be on “credibility,
plausibility and trustworthiness” (Glaser & Strauss, 1967, pp. 223), not validation
which implies some kind of accurate positivistic, quantitative results. Other attributes
confirmability (Sikolia, Biros, Mason, & Weiser, 2013). Validity, reliability, and truth
are terms that are incorrectly used in relation to qualitative research, as they carry
quantitative connotations (Corbin & Strauss, 2008). The data used to construct the
theory cannot be reused as the data to validate the theory. The intent of this research
The use of constant comparison, multiple slices of data, and multiple data sources,
triangulate and correct any inaccuracies in the data to enhance credibility (Strauss &
Corbin, 1998). Negative cases and variations of concepts will also be actively sought
after and documented when found to also improve credibility, and prolonged
engagement with participants is planned (Sikolia et al., 2013). Where possible, use of
participant words (in vivo terms) will be used in the emerging theory to improve
collecting, coding, analysing, and presenting data are what dependability in this
grounded theory study should be judged on (Glaser & Strauss, 1967; Sikolia et al.,
2013). Since this doctoral study was conducted by a single person and the ethics
statement did not allow for data disclosure to other persons, assessing confirmability
by presenting the same data to other researchers and comparing audit trails for
procedure completion with the original researcher is not possible in this study.
114
CHAPTER 3: RESEARCH APPROACH
The chapter began by identifying the overall aim of the research, based on the
findings from the literature review in the previous chapter, which surveyed the
literature, mapped the territory and identified gaps in knowledge. A research process
flow chart was given depicting the steps that would be undertaken during the course
of the entire research program. The adopted research approach begins with an
information security strategy, which in this case is nominalist. The key areas within
and collecting and examining methods. The data sources include interview
transcripts, information security strategy documents, and personal field notes taken
during the interviews. The data collection and analysis procedures were adapted
The next chapter describes the findings from collecting data based on the research
approach described in this chapter, whilst remaining aligned to the research aim and
the revised research question. The findings include analysis of transcripts from
interviews with senior security executives within very large organisations, field notes
information security strategy documents where they existed and were permitted to be
released. The collective results are analysed, and these analyses are then
115
Chapter 4: Findings – Information
Data collection via interviews, document collection and examination were conducted
over a two-year period. This research was initially exploratory and then explanatory,
focussed on building and developing new theory (Corbin & Strauss, 2008; Zmud,
1998). This chapter is titled Findings not Results to avoid ambiguity arising from any
perception that this research involves empirical tests which would have results. Being
The aim of this chapter is to describe the findings after analysis of the data, providing
a rich description of the concept of information security strategy, analysed for its
properties and dimensions, noting any variations throughout. After the data were
analysed, the analyses are aggregated into categories, integrated, and interpreted in
The anticipated problems with collecting data of a sensitive nature, such as that
select a few organisations to study with which they have established a strong
relationship and trust (Kotulic & Clark, 2004). I spent two years collecting the contact
details of senior security executives at industry conferences and events before the
data collection phase began and I believe these pre-existing relationships contributed
greatly towards the high rate of success with research subjects agreeing to
116
CHAPTER 4: FINDINGS – INFORMATION
chose interviews as the key data collection method, which conformed to advice about
The interview data were gathered over a two-year period. This allowed for constant
comparison between interviews and improved rewording of any questions that were
only through interaction with data the relevant questions emerge” (Corbin & Strauss,
2008, pp. 216). In all, the research questions were reworded or changed 14 times. To
briefly recap the data collection and analysis procedures, the interview phase sample
minutes duration, there was individual variability in the results. The interviews were
communication styles meant that some interviews were as short as 30 minutes and
minutes of interview audio for transcription, which produced transcripts with 152,000
was in another territory or country whilst travelling and the interview was conducted
over the phone via a conference-call and recording service (Polkinghorne, 1989). I
found it difficult to maintain rapport when the interview was conducted via a
telephone call and experiencing intermittent latency issues with voice transmission,
however I took the time to reassure the participants that I had designed the research
to be as low-risk as possible to them, which went some way towards lowering their
apprehension.
117
CHAPTER 4: FINDINGS – INFORMATION
transcribe the participant’s answers during the interview. There were some risks with
recording device and received a call in the middle of the interview because I had
national voice data carrier had multiple outages and after several attempts to conduct
occasion when reviewing the audio-recording after an interview, I discovered that the
interview and stopped half-way. Luckily the audio-recording service company had an
IT department that was able to restore the full recording from backup after some
effort. On another instance, for some reason there were latency and reverberation
issues with the quality of the call. Whenever I asked a follow-up question, there was
a few second delay which meant my words interrupted the participant, who had
possible.
and was supplied, this formed a secondary source of primary data collection, serving
analysis tool, and the content manually coded into themes, which are concepts in the
118
CHAPTER 4: FINDINGS – INFORMATION
data (Strauss & Corbin, 1990; Yin, 2011). The data analysis began after the first
interview and the use of constant comparison meant that the interview questions
needed refinement and were changed to improve coherence and to more accurately
sample of 40% public sector-oriented organisations, allowing a crucial insight into the
public sector to assess whether the unit of analysis, information security strategy, has
organisations) were from the finance sector and 24% (six organisations) were from
either the ICT or consulting sectors. 8% (two organisations) were from the education
sector, 4% (one organisation) was from the pharmaceutical industry, one was from
119
CHAPTER 4: FINDINGS – INFORMATION
*Small= 1-20 employees, Medium= 21-100, Large= 101-1,000, Very Large= 1,001+
**Provided an information security strategy document during data collection
120
CHAPTER 4: FINDINGS – INFORMATION
the procedures set out in the previous chapter (Corbin & Strauss, 2008) and 152
concepts were initially identified. After analysis for duplicates, that number was
reduced to 130. Then, after combining concepts that were very similar or
underutilised, the number of concepts was reduced to 109, as “coding helps the
analyst to get inside the data, to start to feel them at a gut level” (Corbin & Strauss,
2008, pp. 170). See Appendix G: Data Structure for a summary of concepts and
categories.
Concepts in this context are defined as the word identifiers, created by the
researcher after analysing the data, that describe ideas expressed in the data by the
research participants (Corbin & Strauss, 2008). If a participant uses a word that
may borrow this word for use as the concept name, and this is called an in-vivo code
(Corbin & Strauss, 2008). In the following Information section, four in-vivo concepts
are identified in the data, which are fortification, devaluation, minimisation, and
Concepts were identified and described in detail along with their properties,
dimensions and relationships. A group of concepts that relate to each other can be
2008). The following is a list of categories identified in the data and are summarised
in Appendix G: Data Structure. They are primarily drawn from the interview data but
are supplemented and reinforced using data from observations and document
collection.
4.2 Information
Several concepts were identified that relate to the core category, information. The
four main concepts that emerged from the data were accessing the functionality
121
CHAPTER 4: FINDINGS – INFORMATION
information value. A few properties of information were also identified which were
To summarise this section, the key asset being secured is information, not the IT
systems it resides on, which affects security governance, although variations exist.
An important point is that the key asset being secured and used is information. It is
important to state this because there was some variation in views about whether the
infrastructure or platform that information resides on, or whether the staff or systems
that interact with information, are assets of similar or greater importance. Of course,
from this research data, information is the key asset around which the other
stakeholders and platforms revolve. MgtCo2 stated “we are pushing toward a data-
“We use something called most valuable information. You’re probably familiar
with the term crown jewels. With any company, there’s always a set of what
you call mission critical assets and that can be a set of IT applications or
without them, the company would either cease to function or even go out of
One variation on this view comes from TelCo1, who objected to the focus on
122
CHAPTER 4: FINDINGS – INFORMATION
organisation, the Chief Security Officer. So, from enterprise-wide, one side of
the organisation to the other, all things security are accountable to me.
If you actually take the word security and you apply that to cyber security, to
lies with one accountability, and that accountability belongs to me. I believe
as a business risk going forward, not just here in Australia, but it’s a growing
TelCo1 held primary accountability and was then accountable to the board. TelCo1
held the view that information security can’t be separated from physical security or
personnel security because they are too intertwined. The delineation between the
different areas internally is too difficult and leads to confusion during and after a
security breach. In TelCo1’s view, this causes difficulties both in timeliness and in
security however does not necessarily invalidate the view that information is the key
ranging from low to high, and high can extend to being irreplaceable. This affects
research participants did not universally agree on how to precisely measure the value
of information other than to say it was generally high or it was low. The one variation
123
CHAPTER 4: FINDINGS – INFORMATION
on this was another dimension of high value information, which was when high value
The journey for organisations to optimally manage the value of information held
within the organisation is to begin by taking the time to discover and audit all the
information holdings. On the storage of information with low value, ITCo4 lamented,
make any distinction [between high and low value data] and that's a part of
the problem. So, they use really expensive hardware and services, and they
organisation to conduct core business then it has high value to the organisation. In
related to collecting payments from customers (non-core business, in this case credit
card numbers from health practitioners) and information about the quality of care they
“we don't need credit card details to do our business. We do need to know
that you've paid your fees, but I don't need to know your credit card details
necessarily. But I do need to know that you're a practitioner, that you're doing
things that you say you're doing, and I can identify you. That's to do my
business.”
In terms of how to assess the value of information, the nature of the information or
what it relates to can determine its value, and hence its stakeholders and regulatory
oversight. For example, FedGov1 identified that “we have information that identifies
people and also some about their health, so that automatically puts us in the Privacy
Act.” StatGov1 added “the closest we've got, I guess, is personnel data, so for our
124
CHAPTER 4: FINDINGS – INFORMATION
own staff and potentially related health, like sick leave and that kind of thing.” Some
the person or the data owner or the delegate to the data owner, facilitates the
element.”
FinCo3 saw merit in following a business value framework rather than a specific
framework than cyber security, to look at the impact of something either being
ResCo1 used a business value framework that was based on business concepts
sharing,
“We have an enterprise risk management framework that calls out things like
what the impact is, and then, people assess the data based on that.”
It is important to note that the classification of information does not drive the value
but rather the value drives the classification, which then has implications for the level
of security controls put in place to protect it. FedGov2 illustrates “It’s not just the
classification that determines how we store and handle our information, it’s the
125
CHAPTER 4: FINDINGS – INFORMATION
“we did some modelling on a high value asset data holding. So we did a full
audit of asset holdings, and we had the business owners, or the data owners,
apply a score to the level of protection they believed that their data required,
and then we went down to the information management layer and started
looking at how we segment, how we structure, how we tag, label, and mark
FinCo3 also highlighted that the value of information drove decisions about the
volume and type of security controls that are put in place to the protect the
information, stating,
controls. So, things that aren’t very sensitive, we don’t put as much energy
organisation to increase the volume and type of security controls is important and will
In a sign that government regulators are getting their policies right, the value of the
“most views of security are still defensive in nature. So, the question is: I’m
not worried about losing credit card data because it’s valuable to me. I’m
worried about losing credit card data because I’m going to get fined and get
into trouble with [Payment Card Industry] Security Standards Council if I lose
that data. And I’m worried about losing customer data, not because customer
data is valuable to me, but because I might have to disclose that breach, and
126
CHAPTER 4: FINDINGS – INFORMATION
I’ll get reputational damage. So, the approach is much more defensive rather
Interestingly, beauty is in the eye of the beholder, in that sometimes the owner of the
information might apply a subjective bias and overrate its value. EduCo2 impartially
observed what when determining the value of information, “the answer would depend
“So, research information, for example, has value to a specific subset of the
organisation, and in all honesty, some of it probably has little value because
we do generate lots of it. … But prima facie, research information that can
information that has value, both potentially, inside the organisation and
outside.”
EduCo2 did note however that this was not always the case and that usually the
value is more apparent, stating “there’s the usual categories of business information
that has value around financials and information about employees, students, and so
forth.” TelCo2 was also very clear about what their most important information was,
stating,
“I’d say the first bin that we would classify data in would be according to the
regulator. That which is sensitive from a regulatory point of view, that would
come first and foremost because we have our licenses, and we must comply
TelCo2 clarified their three main sources in decreasing levels of value, with “I’d say
regulatory, … then customer, and then internal would be three that we would classify
data in.”
127
CHAPTER 4: FINDINGS – INFORMATION
One property of information is value and one dimension of value is low. Low value
for confidentiality. ITCo2 confirmed “low value equates to publicly available or can be
accessed publicly. … You want [sales] brochures, you want information about the
company, you want to know our addresses, etc. Fantastic, just let it go.” This did not
negate the need for availability or integrity, as ITCo2 continued, “changing details can
product for $1,000, you don’t want somebody change the price to $10.” These two
aspects of the CIA triad may still require strict security controls to be in place to
protect the information, as ITCo2 offered “if you want to get specific data, or I want to
change specific data … then you may need a certain level of authentication”.
One reason that information has low value is that it has lost its value over time, as
PharmaCo1 explained “some data is obsolete, it’s out of date or whatever.” FedGov2
confirmed, “90 percent of the data that sits within our data holdings is probably short-
term or volatile data. It's good for a point in time, and then after that it becomes
historical.”
That doesn’t mean that organisations can automatically blanket-delete all old
information to lower risk, as FedGov2 continued, “The problem is that we've got
these regulations around storage of data and having to keep certain amounts of data
under the Privacy Act 1988 for seven years or longer.” PharmaCo1 experienced a
similar situation, explaining “we're a drug company. We need to retain things like
manufacturing batch records for 30 years.” In the case that historical information was
required to be kept, the approach PharmaCo1 took to protect itself was this “type of
128
CHAPTER 4: FINDINGS – INFORMATION
information is archived. When it is archived, it's encrypted, and then, quite frankly, I'm
organisations (“A good example is SharePoint sites. Those things seem to grow like
years old. Or to use the classic government example, this is now 30 years old, so
destruction.”
because information lifecycle management offered more than just governing the
“Our information is stored and kept and the whole life cycle is managed by the
State Records Act 1998, and that decides how long we will keep that
we had to secure email for 20 years or 30 years, but what we have done is
we said no. If the email is the record which you want to keep, you have to
save it in the project folder and in the record management system. So now,
our email retention policy is only two years. … If you need that information, …
then you save it in [records storage system] and it will be categorised based
on what type of record or information it has, and then it will follow the records
129
CHAPTER 4: FINDINGS – INFORMATION
The low value of information also has implications for the level of controls placed
around the information to protect it, as ITCo3 broadly offered “[if] the information is
low value [then] don’t worry about protecting it. We have this concept in our company
of minimum viable security.” This idea, to use minimal efforts to protect information,
may appear contradictory at first but there are business benefits to this approach.
This relationship where the presence of low value information causes an organisation
to decrease the level of security controls is important and will be termed P1b in
Figure 7.2.
One benefit to this approach is being able to employ plausible deniability against
security is: What do we need so that if something goes wrong we’re not seen as
security budget, so that more financial resources are available to protect high-value
“By categorising the information, you can actually get bang for your buck. You
can put the right security controls around the [information] that matters. …
When questioned as to why that is important, TelCo1 responded “Well, you’ve only
that “business information is a business enabler”. PharmaCo1 added “We create new
information and new ideas that turn into drugs. Information is the new currency.”
130
CHAPTER 4: FINDINGS – INFORMATION
employees and customers but was less concerned about their own organisational
information, stating “Our financial data, who cares. It's not something you want to
The possession of high-value information had implications for its storage, in that
organisations should keep all their high-value information in one carefully defined
basically so that they can keep all their sensitive data in a relatively
constricted set of systems and environments that they can apply more
controls to, rather than having to apply all of those controls across
The nature of the high-value information may also place restrictions on the location
that it is stored in, and PharmaCo1 gave an example of, “In the case of personal
identifiable information, there are also national and regional regulatory issues about
data residency.” Identification of the most appropriate location begins with a risk
overhead is in need on that, and what are the basic tools and sets that need
High-value information also requires a higher level of security controls to protect it, as
FedGov3 explained that “there’s a range of interlocking physical and IT systems that
are used to protect that information.” EnerCo1 uses a varying number of “about 130
131
CHAPTER 4: FINDINGS – INFORMATION
[US National Institute of Standards and Technology] controls” depending on how high
“If [information value is] low, you might have, say, 40 controls, and if you’re in
the middle layer, you have that 40 plus another 20, and if you’re at high layer,
you’ll have [all of them], which only should be about 5 percent of the
beginning by identifying the main threats. Threat identification allows for more
whether the threats are persistent or targeted, to protect information. FinCo4 said
hunt externally for threats and gather intelligence, for example from the dark
web. The second step is to protect our perimeter. The next step is to protect
our internal infrastructure and networks. The final step is to protect our
of systems rather than trying to separate them, as AvCo1 explained “we’re more
focused on the application itself, … and then look at what makes up the ecosystem of
that application.” Although this organisation stated they focus on the application, this
approach does not invalidate this research’s focus on information as it was clear that
this organisation, it needs to be available all the time. You can’t afford to have
any downtime, then that becomes good criteria to be the most valuable
132
CHAPTER 4: FINDINGS – INFORMATION
passenger details”.
continued “the level of access is decided based on what is your need-to-know policy.”
protection of trade secrets that were central to the core business of the organisation
was crucial. Once trade secrets are leaked, they can’t be ‘un-leaked’ and the results
of this loss can result in short to long-term damage, up to and including bankruptcy.
Identification of irreplaceable high value information has implications for the storage
reducing the risk of its loss as low as possible. ITCo4 confirmed “The highly-sensitive
trade secret type information is generally kept on isolated systems within our
corporate environment.” ITCo3 agreed that irreplaceable high value information must
“If your IP is genuinely that much of – if you lose it, then it’s over kind of
scenario, then, yeah, it’s going to be like the recipe for Coke and the recipe
for Big Mac sauce and keep it locked in a vault and systems that are not
AvCo1 used the term Most Valuable Information to refer to irreplaceable high value
lost, affirming,
133
CHAPTER 4: FINDINGS – INFORMATION
“We use something called Most Valuable Information. You’re probably familiar
with the term crown jewels. With any company, there’s always a set of what
you call Mission Critical Assets and that can be a set of IT applications or
without them, the company would either cease to function or even go out of
MgtCo2 agreed that “it’s normally around the criteria of crown jewels, as to what
information is the most important that will either bring their business to a halt or will
put them on the front page of the news.” FinCo4 offered an analogy to illustrate the
external cloud-based solutions can be more secure than what you have
internally. For us however this doesn’t make sense. Our internal data centres
are more secure than what can be found in the market as we have the funds
to make this possible. The other reason I wouldn’t use an outsourcer’s service
enough.”
dimensions according to the data: 1. Full control, 2. Shared (partial) control, and 3.
134
CHAPTER 4: FINDINGS – INFORMATION
Full control was adopted by ITCo1, who had experienced negative situations where
information was shared onto cloud-based platforms, and the organisation had lost
control of it because of the multitude of devices that were used to access the
“It's inherently insecure because it'll take documents and stick them on all
different devices. You've got no control over where they are, no control over
what's going on and the like. So, we made a ruling that not using Dropbox
“when data gets stored in information management systems, you then just
rely on things like your data filtering, and your identity, and access, and
management controls to put the layers of protection around who sits in what
role, and has what function, and what permission, and what access to what
piece of information.”
FinCo1 maintained full control of their information by storing it on-premises and was
able to maintain control even when moving it for processing off into the cloud to take
“It’s about the service, or the cost of the whole service, the infrastructure, or
we’ve got control of the data, and this has been going out for the workload
and then brought back down. So, I don’t think storage of information is the
driver. It’s the operational efficiencies and the agility of consuming services.
135
CHAPTER 4: FINDINGS – INFORMATION
RetCo1 saw no problem with maintaining full control over highly-valuable information
would store trade secrets outside the organisation, RetCo1 decided “not in an
This relationship where the organisation maintains full control over high value
information to increase its security is important and will be termed P2a in Figure 7.2.
“I own the controls associated with protection of the data, so I can put
encryption controls over the data. I can manage the configuration of the
infrastructure. Will I put valuable information in the public cloud? Yes. Would I
management of their information and sometimes also their ICT infrastructure. RetCo1
was very clear on outsourcing when stating the difference between maintaining
hosting platform. Whether I book the data centre myself or I use somebody
else’s data centre, it doesn’t really matter for me. I’m not outsourcing
136
CHAPTER 4: FINDINGS – INFORMATION
To make the concept clearer, RetCo1 gave an analogy, using a car as an asset
“if I go to a provider and say, hey, I never want to drive again. Come and pick
me up, I need you to take me wherever I need to go. I don’t want to ever see
a car or car invoice or anything like that again. I don’t want to drive or touch a
steering wheel again. That’s outsourcing driving. Otherwise I’m just leasing a
car.”
are acceptable and the level of service required. When referring to the outsourcing
“You can manage everything on my behalf and just give me a monthly OpEx
figure that I pay for. I don’t care how many people you need to use. Here’s the
SLAs I want. Here’s the agreement that we have, and I don’t want to see
One insight into the concept of partial or shared control of information is that, in an
doesn’t care that it wasn’t this organisation that lost their data. They trusted this
This relationship where an organisation can maintain partial control over high value
information, yet increase its security is important and will be termed P2b in Figure
7.2.
137
CHAPTER 4: FINDINGS – INFORMATION
With regards to outsourcing, there are more properties, dimensions and variability,
which I will analyse in later sections. This section is focussed more on sharing control
of information, which overlaps with outsourcing, hence the brief foray into the
concept.
and responsibilities. ITCo3 stated “the bigger element is organisations just trying to
avoid having the information at all.” ITCo3 explained “rather than take payments
yourself, use PayPal. Just get rid of that [credit card data] so you don’t have that data
This relationship where the organisation maintains no control over high value
information to increase its security is important and will be termed P2c in Figure 7.2.
To summarise this section, information doesn’t have to be owned to utilise it. The
A subtle but important theme that emerged from the data was the idea that
organisations don’t hold information just for the sake of holding information. They
want to use the information to obtain some sort of benefit. This separation between
information and its utility is important because the end benefit can sometimes be
derived without actually owning the information. Whether an organisation should use
138
CHAPTER 4: FINDINGS – INFORMATION
“If something's non-core, then you've got the ability to go out, but then if it's
non-core you probably don't care as much anyway. But what would be an
information that would be something you'd want to be really tight on. And
sure, it might be great to have that credit card information, but you're better
off finding another way to use that customer identity data, if you want to use
This relationship where the ability for information to form the basis of a core
will be termed P3a in Figure 7.2. The relationship where information does not form
the basis of a core competency, which positively affects its ability to be stored
To summarise this section, the classification ratings system is set by a Chief Data
upon creation.
All organisations classified their information in some fashion, which FedGov2 did
extremely rigorously, but others such as ITCo1 less so, at least “not in a structured,
139
CHAPTER 4: FINDINGS – INFORMATION
that is a load of different layers of assessing the business impact level and
FedGov2 went on to list the labels commonly used by government departments and
When classification labels are not mandated by a relevant authority and the
organisation has the freedom to decide their own set of classification labels, they are
best off keeping them simple for ease of understanding by the data owners and other
stakeholders who interact with the terms. ITCo2 offered, “we use this arcane
terminology that doesn’t make sense to the normal human being … we forgot the fact
that it’s really about our employees and people in the business that need to do things
simply.”
guidelines for assigning them are set by a Chief Data Officer, as TelCo1 said “we do
have document classification, … developed by the Chief Data Officer.” The data
owners are then responsible for navigating the guidelines and applying a
classification rating to their information, as FinCo1 says, “security doesn’t classify the
data; the data-owners do.” A commonly-held belief is that the creator of information is
also the owner, as FinCo1 says, “the creator of the information is the one that should
creation.” The Chief Information Security Officer (or Chief Security Officer) is
responsible for architecting all the security controls that are used in a coordinated
They are responsible for increasing the number of controls used to protect high-value
140
CHAPTER 4: FINDINGS – INFORMATION
Importantly, business executives may decide not to take the advice of CISO and
proceed with an alternative course of action that increases risk, against the
recommendations of the CISO. There may be very good business reasons for
deciding to do this. In this case, the CISO can simply direct the business executive to
sign an acknowledgement form and accept the increased risk. TelCo1 would say to
business executives,
“if you decide to still outsource the data and don’t protect it in this fashion,
fine, good luck with that. I’ll be here to help you clean up the mess if
something bad happens, but ultimately, there’s the risk acceptance form,
There are three stakeholders at work in this scenario (data owner, CDO, CISO) and a
lack of accountability can arise when a security incident occurs due to confusion
“here’s the thing from a Chief Security Officer’s perspective. In the past, we’ve
been blamed for that. Sensitive data, which [wasn’t classified] correctly, is
lost. All of a sudden, it’s the security person or the security group who has the
problem. That’s wrong, and the reason that security finds itself in this situation
The root cause of issues arising with loss of high-value information can sometimes
be attributed to the data owner not applying the correct classification to the
“I can actually put things in place to mitigate the risk of protecting data once
we’ve identified it, but if it actually turns out that they told us this is low-risk
data, it shouldn’t be treated as such as anything else, it turns out it’s really
141
CHAPTER 4: FINDINGS – INFORMATION
everything.”
responsibilities into one security role, as TelCo1 says, “If you’re going to blame me
anyway, then I’ll do it properly for you, and I’ll get the right people together, and we’ll
have the right synergies and the right engagement model, to do it properly.”
“we did a full audit of asset holdings, and we had the business owners, or the
data owners, apply a score to the level of protection they believed that their
data required, and then we went down to the information management layer
and started looking at how we segment, how we structure, how we tag, label,
FedGov2 advised to avoid problems with holding large amounts of information that
had not been classified, and “the best way to do that is to have a really good strategy
for how your business users actually generate the documentation in the first place.”
To summarise this section, information can reside on paper and in employee’s brains
as well as on computer servers, networks and databases. The three main areas to
decide between for digital information location are internal, external but within
Australia, and external anywhere in the world. Factors such as control and risk of
Information is stored and used in many physical and logical locations in modern
and mobile devices have changed that way that organisations must now deal with
142
CHAPTER 4: FINDINGS – INFORMATION
means that if organisations don’t take the time to consider their adoption, then
“A real good example of that is the recent PM&C (Prime Minister and Cabinet)
management with five-eye countries (US, AUS, CAN, NZ, UK) preferably.”
systems, which pose their own unique challenges for maintaining control over their
minds by reducing reliance on contractor resources, stating, “We … have a high level
of internal technical knowledge, so we don’t see any need to take risks by using
converting them to digital artefacts, stating “we've now scanned all our old paper
records, and everything's stored online … so every part of our business is electronic.”
ResCo1 also sought to control the location of high value information, stating they
use,
onboard, offboard people who have the ability to manage documents and do
all the things like watermarking and making sure who printed it and have all
sorts of controls”.
All organisations have information but only 15 from 25 of the research participants
claimed to actively discover and identify all information. This number dropped further
143
CHAPTER 4: FINDINGS – INFORMATION
social media, mobile devices, and cloud-based storage. StatGov1 confirmed that the
There are various reasons that organisations might decide not to host externally,
such as loss of control, security concerns from country risk, and environmental
concerns. EduCo1 confirmed, “The locality of that service organisation data centre
“data residency and sovereignty laws go a long way to constrain the problem.
A clear source of concern for many research participants was the reduction in control
and increase in risk of information leakage should they outsource the storage of
impossible to determine its physical or logical location. Although the organisation can
confidently state its primary location, it cannot be sure that the information has not
information has not been shared with an undisclosed third party. It also cannot be
sure that the information has not been stored overseas. FedGov2 acknowledged,
144
CHAPTER 4: FINDINGS – INFORMATION
“if it’s sensitive and needs to be held within the confines of your geographical
location or your country location, and then they don’t even consider, … simple
“One of the reasons why Amazon created a data centre in Sydney was
because everybody was saying, we don’t want the Patriot Act to be enacted
and find our data sucked away or locked up for whatever reason.”
ITCo2 continued with, “The difficulty … is how do you know that, even if it’s on-shore,
that it’s not being backed up somewhere off-shore?” Governments and other
In the case of personal identifiable information, there are also national and
Cleverly, this uncertainty over loss of control has led some suppliers to capitalise on
“it’s really a question of where the data is stored. … all of our data centres
[are] onshore. Also, interestingly, our call centres are onshore. We have
differentiated ourselves with our customers who … like what we offer: data
145
CHAPTER 4: FINDINGS – INFORMATION
FinCo1 gave an example, stating “we do workload in the cloud but storage on-
premises so that we’ve got control of the data, and this has been going out for the
The motivation for adopting this confluence of internal and external platforms was to
provide increased resilience within the organisation. ITCo4 that they took the time to
“to have data portability so that if something happens inside the outsourced
environment, they can potentially bring that data back into their on-premise
environment, or some other service provider, and get it up and running again
really quickly.”
Not all organisations had the freedom to make the decision about whether to adopt
precluded the use of externally-based locations for information storage and use.
requirements around privacy, GDPR, the Privacy Act.” FinCo4 identified that
regulatory compliance was an issue, with “We have no appetite to upset our
regulators and risk losing our licence, so we comply with any stipulations the
This dyadic choice between internal and external seemed to make little difference
overall however, according to the research participants. EnerCo1 stated “It doesn’t
matter whether it’s offshore or outsourced here, insourced, … it doesn’t make it any
more secure. So, the actual location, as such, it doesn’t necessarily change the
agnostic, with “I encrypt all of that data on-premises before it leaves, and then inside
146
CHAPTER 4: FINDINGS – INFORMATION
the outsourced environment I'm only ever storing encrypted information.” One caveat
also the outsourcer for very, very high-risk organisations, then, in a sense, I’m
Information may reside on external locations when shared with other organisations
for various reasons. ITCo4 confirmed “We do actually enable our employees to use
those kinds of information sharing in a controlled way.” A good example was shared
“Most companies may not have a secure data room that is externally
common platform that all three can trust, as opposed to one person’s
premises.”
outsourcing partner. This has implications for achieving trust in the partner through
Problems arise with accountability when organisations are not clear about who owns
what information. Most mature organisations mandate that there are business
owners for information and don’t assign blanket ownership to the IT department.
147
CHAPTER 4: FINDINGS – INFORMATION
FedGov1 had historically not identified information owners and had recently sought to
redress the situation, stating “the idea with the information asset owner piece was
that we would identify who's the actual owner because at the moment IT owns
everything.”
“All of the data that we have electronically, the data owner has responsibility for it.
One of the responsibilities of being a data owner is to manage the life cycle of it.”
Organisations need to remain cognizant that sharing responsibility for managing the
storage or use of information did not diminish their ultimate accountability for
ownership of information. It was clear from the data that responsibility can be shared
with other organisations, but accountability cannot. FinCo1 was emphatic when
stating “You can’t outsource accountability. … Our customers won’t be satisfied with
me saying, sorry, you’ve lost all your credit cards because PayPal didn’t hold onto it.
manage information on their behalf and the answer is “it takes a lot of work”,
perspective. So, we’ve got pretty robust third-party security risk assessment,
perspective that all of the things that we would do for ourselves are being met
by our partner.”
Equivalence is the key issue when building trust. The security framework and
share responsibility for managing information must be the same or better that what is
148
CHAPTER 4: FINDINGS – INFORMATION
customers, regulators, staff, and board directors, and information needs to be shared
same questions about our security. So that’s good. That shows the industry is
“gets pretty tough sometimes, when there’s big, multibillion dollar deals that
function to a partner. And we’re going, yeah, but you need to make sure you
spend the right money up front from the security perspective because … our
business application, then yes, you would be very aware of the level of
you are, for example, the data owner of a single document, for example,
much of my email, then you would be less aware because of the lower
Figure 4.1 summarises the ICT infrastructure commonly used to store information of
149
CHAPTER 4: FINDINGS – INFORMATION
various sensitivities. Not only can contractors be used to manage infrastructure, but
they can be used to either fully or partially manage information as well, although
This chapter describes the findings from analysis of the data, providing a rich
description of the concept of information security strategy, analysed for its properties
150
CHAPTER 4: FINDINGS – INFORMATION
and dimensions, noting any variations throughout. After the data were analysed,
related analyses were aggregated into categories, which were integrated and then
151
Chapter 5: Findings – Organisational Context
organisation, this chapter describes findings about the external and internal context
which affects the organisation. These contextual factors have a bearing on decisions
The aim of this chapter is to describe the findings after analysis of the data, providing
a rich description of the concept of information security strategy, analysed for its
properties and dimensions, noting any variations throughout. After the data were
analysed, the analyses are aggregated into categories, integrated, and interpreted in
There are three discrete categories of concepts that relate to the storage and use of
conditions are those factors that describe the strategic and operational level aspects
Their existence may have an enormous effect on decisions made both in the
152
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
5.2.1 Organisation
including goals and assets. Goals and assets combined affect strategic decisions.
The characteristics of an organisation affects decisions made within it, so this section
begins with an examination of the organisation itself. The following section examines
the concept Organisation and includes concepts that relate to the various properties
dimensions are also analysed and described. There are eight key concepts analysed
resources.
strategy, are important because they affect how the organisation decides to approach
its information, including storage, use and security. A positive relationship will be
termed P4a and a negative relationship will be termed P4b in Figure 7.2.
There are two more concepts that relate to Organisation, which are Information and
Strategic Impacts on Organisations, but these are core to this research and are
described in their own sections. There are three more concepts that relate to a
Enablers, and Outsourcing Benefits. Constraints and enablers are described in the
sections following Organisation, and benefits are described in the Strategic Impacts
on Organisations section.
153
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
5.2.1.1 Goals
“Our goal is to drive cost down for our customers rather than make money for
literally. Seriously, that's $6 million that's being used over the next three years
When questioned about what the goal of information security was, research
participants sometimes stated the obvious, which was the goal is to keep information
secure. AvCo1 for example, stated “the goal of information security in an organisation
is, obviously, the CIA, confidentiality, integrity, and availability of information assets.
Goals often interrelated and supported each other however. Interestingly, the goal of
information security was not always viewed however as simply keeping information
secure. In a variation of this concept, the goal of information security was sometimes
FinCo1 stated that their primary information security goal was to keep the
customer satisfaction, commenting “the simple plan for us is to keep our organisation
safe, and our organisation is our customers and ourselves”. FinCo2 added that the
goal of information security was to “protect the operation of the organisation. Make
sure the organisation is able to operate safely”. ITCo4 commented “The goal of
and managed way.” MgtCo1 agreed with “Goal of information security for us, I would
154
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
say, is to make sure that the business is able to do business in a more secure
manner.” MgtCo2 thought the goal of information security was “to help the
able to technically implement control over the information that you are going to
5.2.1.2 Strategy
To begin with, most organisations articulated their goals through their vision
shaped the (typically five-year) business strategy. The business strategy was
actioned using three-year corporate strategies and annual business plans. FedGov1
shared “We have a business strategy, then we have a business plan. The business
Sometimes divisions within the organisation were granted the freedom to articulate a
version of the overall business strategy that was more applicable to them. FinCo2
stated “We have a top-level business strategy document which is then socialised
across our entire organisation, and then each business unit underneath that top-level
umbrella has their own strategies.” FinCo3 added “we have several layers of
In a cascading approach, the business strategy then drove the IT strategy. FedGov2
stated they have a “strategy from a business perspective. There are elements of our
IT strategy in that document, but we also have a separate standalone ICT strategy.”
shared they have “a corporate plan, … then we have an IT strategy, then we have a
155
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
cyber security strategy, which is referred to in the IT strategy.” FinCo4 stated “We
take the approach of cascading strategies, where a business strategy gets set first,
information security strategy, which then drove their IT strategy. PharmaCo1 stated
“we have a business strategy document that's done by our strategy committee, which
is senior leadership, but I also have a security strategy document that is mapped to
The order of cascading strategies had implications for responsibilities and the human
resource organisational chart structure. FinCo1 believed that business should drive
IT, which then drives security, and has a lot of experience with “where you sit in on
the org chart and what’s your relationship with the [Chief Information Officer]. I could
talk for hours about what works and what doesn’t work and why our setup’s better
Ultimately the attention and support of the board of directors and CEO is required
information. StatGov1 (a CEO) shared “I'm accountable for everything that takes
place in the organisation, so in that sense I'm accountable for information security
within the organisation.” ITCo1 (a CEO) agreed, stating “As head of the business, I'm
156
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
delegated authority for it, so ultimate authority would rest with me.” If a CEO identifies
a material risk within the organisation, then it is incumbent on them to bring that risk
“I’ll be taking [a contract] to the board in January because there are some
risks associated with that contract that we simply cannot mitigate … I'd be
taking that kind of thing to the board to say here's a risk that I'm gonna be
willing to sign off. What do you think guys? And we'll see.”
FedGov1 shared “It's a reporting function up to our Risk and Audit Committee”
StatGov1 stated “The audit and risk committee would be interested from an
There are several levels that exist within organisations, which begin with strategic at
the top, operational in the middle, and tactical at the bottom. Levels can also be split,
for example business strategy can apply to the organisation as a whole and also to
individual divisions within the organisation. FedGov1 aligned levels to the strategies
particular organisation. The tier one level is currently held by ASD, the
government and policy setting. And then I'm down at tier two where I manage
programs of work are also relevant at various levels. In a description moving from the
security program upwards, StatGov2 stated “So the whole security program … has to
157
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
be linked with the IT program, and then it has to be linked with the business criticality,
Some research participants had security strategies, not just business strategies, that
aligned to various levels within their organisation, including at the highest level.
who publish the PSPF, the Protective Security Policy Framework, and from
that framework, it flows down to ASD, who then publishes the Information
which we implement our ICT security regime. I guess, in a way, those two
framework.”
The board and CEO then extend responsibility by sharing it with the next level down,
“there are also some governance functions that we have internally. We have
underneath that we also have some working groups that do things like
Strategy and risk are inextricably interrelated. Taking a risk-based approach is a key
concept where decisions are made within a defined, formal risk management
framework over multiple levels to implement the strategic plan. The first activity for
the board of directors was to set the organisation’s risk appetite. Then the board sets
the structures within the organisation for undertaking risk management. The board
then sets reporting lines and engages in active monitoring of operations. FinCo1
158
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
outside the appetite set by the board, it has to go to the board, and then from
the CEO and the executive leadership team have another level of delegation
and it comes down. Some decisions from my own sourcing, for example, I
can make myself, and then depending on the materiality, the higher it goes.”
Policy is another way that boards can govern actions within an organisation. The
board can use policies to provide boundaries and procedures for employees, and
“When someone leaves our company, we have a process for exiting and
taking them off all the systems they have access to. … I make sure that
everyone's actually been pulled off and followed back out, just so we don't
have anyone left around getting access to something that they shouldn't.”
The board can affect information security by using a corporate information security
report to the board and executive on progress. StatGov1 shared “I either sign off or
present all policies that apply to the organisation. By present, I mean to the board for
think information security policy would be something the board would sign off on. It'd
their personal information when buying from them and have no visibility into supplier
agreements that the organisation might engage in where their information might be
exposed. As FinCo2 stated, “The customer doesn’t care that it wasn’t this
159
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
organisation that lost their data. They trusted this organisation, not the third party.”
MgtCo2 agreed, stating “it doesn’t matter if it’s stored within … their systems, or if it’s
outsourced into other systems. The accountability of securing that information is still
credit card information. So, at the end of the day, I’m still accountable … to
information (Denning, 1999). This definition conflicts with the data from this research
by an organisation towards achieving its vision and mission. AvCo1 was very
conscious of this, stating “there’s a good degree of information assets across the
company that, if our competitors were to get access to that, would compromise us.”
FedGov2 took the time to identify these resources, stating “We’ve done a whole
bunch of work on modelling our high value information assets. That includes … our
Information turns into a resource when security controls are applied to it, so that it
becomes ‘ruggedised’ and durable. In its durable state, it can be relied upon to
provide utility for the organisation towards the achievement of its goals for many
years to come. Without security controls being applied to protect information, it can
160
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
defaced, then they get taken back to a last known good state immediately, …
And we’re very heavily engaged in ensuring that that public presence is
Many receptacles support or hold information, which can include servers, databases,
networks, paper and cognitive media (employee’s brains) (Ahmad et al., 2005). All
“people don’t get the fact that data can be stored on different hard drives and
offshore, onshore, and whatever else.” The type of platform, its conceptualisation and
classification, informs the type of security controls that are used to protect the
information. ResCo1 articulated the main platforms and gave an example, with
“For example, if it is digital, my remit is predominantly only for digital data, not
Cloud-based storage was a concept that many research participants were concerned
about. Interestingly, the choice of cloud-based platform was important to them. For
example, Dropbox was not popular amongst the research participants, and Google
Drive or Microsoft OneDrive were the preferred options instead. FedGov1 stated
“we're very concerned about Dropbox”, ITCo1 stated “We don't have any business
Dropbox deliberately … because it's insecure”, and FedGov2 stated “We don’t allow
StatGov1 answered “Not personal Dropbox, but corporate cloud, yes … OneDrive.”
RetCo1 stated “we use the Google Drive platform extensively … and they
161
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
[employees] can access it from anywhere in the world” and FedGov1 uses “OneDrive
security controls associated with the cloud-based storage, as FinCo1 shared “We’ve
got visibility all the way to cloud-based storage [using] CASB (Cloud Access Security
Broker) solutions” and MgtCo1 shared “We do monitor cloud monitoring in place, like
… CASB and a Data Loss Prevention.” When asked about protecting cloud-based
restrict the use of cloud-based storage, as StatGov3 stated “it definitely would be
by an organisation’s policies (typically a Bring Your Own Device policy) and technical
security controls. FedGov1 confirmed “our organisation-issued mobile devices are all
protected, but we do have issues with people bringing in their own” Organisations
often protect business information held on mobile devices, whether the devices were
was being used for work purposes, as FinCo3 stated “the personal devices that are
solutions include mobile device management products that can fully segregate
“The tools and the mechanisms we use for distributing data out to mobiles
means that when it goes out to a mobile, it’s actually held within a secure
162
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
video or photographic recording device, and ITCo2 confirmed “I would propose that
platforms. As MgtCo2 confirmed, “Most organisations are quite aware of the social
media challenges to their information assets.” ResCo1 took active steps to address
this challenge, stating “part of our cyber intelligence program … looks at external
platforms where the company’s material is – … the goal is to look for leaked
media, FinCo1 perceived that disclosing certain details about the type of financial
“I’ll give you an example. In the wake of the SWIFT breach in the Bangladesh
Bank, there was increased awareness around people across the world being
we go through social media and LinkedIn and find anyone in our organisation
that works, or purports to have worked with SWIFT, and we go through and
work around what that means and help them with that.”
what we share on social media platforms, of risks in terms of what could exploit the
media platforms did not only occur sporadically in response to a threat, but regularly
163
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
in a preventative practice, stating “we have a full-time social media team that look out
for the other stuff as well. We can feed some security stuff into there.”
Most research participants were either monitoring social media for sensitive
[monitoring social media], but we are thinking of doing that.” In a unique variation of
this concept, ITCo4 was within its rights to monitor social media platforms for
within the contract that you sign with my organisation when you get employed
to say that you potentially could have your social media accounts monitored
ITCo1 was conscious of one of the properties of paper being that it can degrade over
time, affecting its availability and integrity, stating “we've now scanned all our old
degrade.”
information internally or not. FedGov2 offered “it's around setting your information
strategy about what's the important data, what are your high-value assets, and how
being released into the public domain or compromised, and that's where they
164
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
can start to make informed decisions about … whether or not that data's now
StatGov1 gave an example on why organisations might not choose to hold valuable
information, with
“I've reviewed all of my own files to determine if there was anything there that
related to third-party information, which we've got a policy around not storing
from, or anything that was particularly sensitive. Not that I'm afraid of security
have. What I mean is, by taking away the risk, taking away the importance,
Sometimes the decision on whether to hold valuable information was not one that
“I send it up the tree, the Chief Legal Counsel and the CEO would both have
the power of veto, as would the board. But ultimately, I don’t expect them to
know … all of the issues that would impact on that decision. They would
165
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
“You need to be very clear about what you mean by outsource … for me,
behalf. Outsourcing is not going to the cloud. Cloud is just a different hosting
platform.”
which causes conflict and confusion. EduCo2 “I have a very broad definition that
ranges from the more traditional managed services style of outsourcing through to …
“For me, I’d probably default to something like the CPS 231 definition, which
behalf, where either you have a business activity which you would otherwise
augmentation in outsourcing.”
In examining the APRA CPS 231 document to cross-reference, the exact definition of
continuing basis, a business activity that currently is, or could be, undertaken
The APRA CPS 231 document also provided a definition of offshoring, with
166
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
outsource versus a desire to maintain control over their information, sharing “we are
passionate about data jurisdiction and the exposure of having sensitive data stored
offshore”, continuing “we’re always mindful of the Patriot Act and … in today’s day
and age, … unless you absolutely know where your data is at any time, you cannot
be absolutely sure how secure it is.” For ResCo1, this obfuscation of information
location and lack of ability to maintain close control would preclude them from
“We would take a risk for little or no value information … But if it’s highly-
control or visibility.”
storage of information whilst remaining secure. StatGov1 shared their conflict, stating
“we insource, although we're starting to play in the cloud. … we're … deciding how
167
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
Organisations need to remain cognizant about what their core competencies are and
prevailing view that information used to support these core competencies should not
be outsourced due to the loss of control and potential negative strategic impact on
organisational success. When asked about the conditions that might prevent
lot of reasons you wouldn't put some things out. One of the main reasons would be
Any decision to outsource requires careful preparation and due diligence checks,
“We’ve never gone … we want to outsource the database. We’ve gone, we’re
going to outsource this application which has this database, and then the
conversation is where should we store the data? What controls should we put
When making the decision on whether to outsource or not, organisations often took a
risk-based approach and considered the future effects of a security breach in the
event the information was compromised or disclosed. When asked about the
decision to outsource or not, ITCo2 stated “I think it all boils down to simple questions
like would it be problematic … Would it cause you harm if this information were made
public?” AvCo1 also had considered the future effects of a security breach and the
168
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
impact that might have on an outsourcing arrangement, stating “if the database of
infrastructure, AvCo1 replied “No, that doesn’t. That particular one, no.”
In a variation on the level of effort expended in making the decision about whether to
typically, the degree of security they can bring to their data centres is better
constraints and enablers, to gain the advantage of several potential benefits, and
information security are origination and direction of the drive to secure information,
the motivation for same, the influence of security leadership, and key areas of
security, with dimensions ranging from ineffective to effective. Information can never
be perfectly secure due to the existence of unknown threats. Zero-day exploits, which
169
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
perfectly convert unknown threats into known threats affects confidence levels in its
you might as well shut the shop and lock the doors and walk away.”
When moving towards the goal of achieving the best state of information security that
they can, organisations naturally seek to understand where they are now, so they
can improve their posture based on gap analysis towards a desired future state.
problematic. The reason for this is because of the uncertainty around effectiveness of
operational security controls to counter threats, due to the unknown nature of threats.
organisations are unsure whether that was because their detection tools have
become more effective at turning unknown threats into known threats, or because the
not the operational level below it. On strategic measurement of information security,
FinCo2 agreed “It’s a difficult question. There’s no single silver bullet.” To collaborate
using a dashboard with metrics, some of the research participants used the US
“It’s a very challenging question. Most of the metrics are pretty bad. The
reason being that there’s no direct correlation between the amount you can
spend and the likelihood of getting hacked. So, you end up with a lot of
quantitative numbers that don’t really tell you anything … we generally will
170
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
framework, identify, protect, detect, respond, and recover, and come up with
The main problem with information security in organisations is the uncertainty about
whether threats will eventuate into security breaches or not. This then causes other
problems such as deciding how much budget to allocate towards information security
programs. The only rational action available to date is to assess known threats,
understand the location and value of their information, and implement security
controls to prevent and respond to known threats in a manner consistent with the
value of information held. When threats eventuate into successful security breaches,
in spite of large security budgets, organisations have been left without the language
Threats are mostly known so can be prevented, but there are some threats that are
their effectiveness is unknown, given threat actors routinely impair their functionality.
So, some threats are unknown, some valuable information is unknown, and the
ITCo3 continued with an example serving to highlight the problem with measuring
“As an example, people often bandy around spam numbers. We blocked 600
email-based attacks this month, and then next month you say we blocked 700
attacks this month. Great, is that a good trend, or is that a bad trend? Then
the next month you block 400 attacks. Does that mean you’re blocking fewer
171
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
attacks or there were fewer attacks and you blocked just as many of them?
And is that something that you’ve actually affected, or is that just a random
The volume of unknown threat vectors might be small but they’re still there.
Therefore, organisations cannot claim to have 100% protected their information. The
days, you can never know whether something is completely safe or not, but you can
There were other ways for organisations to measure their information security at a
and also measures “incidents, like near-misses and actual incidents, and you would
processes, and the state government digital information security policy has
processes.”
The significance of the problem with measuring information security at the strategic
security people have to be able to communicate a good story to the board.” This was
highlighted by EnerCo1, who quoted a board director he had met recently who
stated, “the problem we have about security is no board of directors actually knows
172
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
By their very nature, most security professionals perceive that they must maintain
outcomes. In a variation on this concept however, TelCo1 put the security framework
in place to support good decisions being made by business people but did not
“I don’t own the problem. Too many [people] in security think the world is
going to fall on their head if something bad happens after they’ve called
something out. Well, I’m totally the other way. Here’s all the information you
TelCo1 always made this transfer of control over outcomes explicit however, by
overriding the security recommendation, with TelCo1 declaring “I will not sign off on
the delegation of risk. That’s how you survive long term in these jobs.”
Transparency and respect for the authority of business executives to make business
business people in their organisation, then the business people often procure
“If you run around and make it really hard for people to do business … they
go around you. They run projects without having you give advice and do a
risk assessment. That’s even riskier because when you don’t know about it,
you haven’t been involved and something bad happens, then it is your fault
173
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
the motivation to improve security, with the two dimensions being top-down and
bottom-up. The two opposing dimensions had various levels of support from within
stating bottom-up, and eight participants stating both. The reasons for top-down
included the senior leaders, who were accountable for security within their
organisations, being risk-adverse. FedGov1 stated “It's the executives and the
boards who are trying to push it down, and we're reasonably risk-adverse because
the event of a security breach was also helping to motivate organisational leaders.
ITCo3 recognised this, stating, “As much as anything, it’s about the board trying to
recognised that motivation had changed over time, where IT staff had identified key
security risks some time ago but in modern times, risks to organisations were
becoming more publicised, so leaders were taking more interest. ITCo2 stated
“It used to be, 10 years ago, bubbled up from IT, but now there are enough
here, you now have boards who are starting to say, are we legally liable? The
“the boards have a duty of care and are accountable, ultimately, so they are
driving change as well. We’re definitely seeing a shift, whereas I think you go
back 10 years, for example, it would have been the technology team saying
we’ve got a technical vulnerability that we need to close, and if we don’t, it will
174
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
of business discussion.”
One reason for a bottom-up approach was a lack of accountability in senior levels
within the organisation which left the burden of compliance on the lower ranks.
everything flows down to the point where you implement systems and controls, and
“How do you change that dynamic? You make people accountable. … Give
[senior people] the role of being the risk steward or the risk owner, and you
make them responsible for accepting the risk of things happening below them
TelCo1 agreed with a bottom-up direction but for a different reason, believing a good
“Bottom line is, the guy on the factory floor, the girl at the front desk … it’s their
The reasons for both directions were that boards are often uncomfortable with having
to accept extreme levels of risk, and staff are closer to the action allowing them to
“The board is pushing down for treatment of risk. Regulators are pushing to
see that a good standard of practice is applied, and risks are under control,
under management. Staff very often do identify the gaps and issues and raise
systemic.”
reason that both directions of motivation may be found. If the board of directors is
175
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
security strategy and security policies more effectively within their organisations,
whereas if they are not, then they are dependent on staff to report issues up to them.
ITCo4 confirmed,
“The organisations that are well-advanced and quite mature in this tend to
find that their boards and their executives are fully across and aware of
security. For organisations that are much less mature, or are just branching
into this, or are just starting to get it, what you'll see is that it’s actually the IT
team or the IT security team that’s pushing for the implementation of security,
and they're having to put up business cases and arguments to the executive
on why they should invest in security. So, in a lot of cases, it just depends on
The research participants in this study all had a sense that they were responsible or
accountable for information security within their organisations. ITCo1 stated “anything
with information security ultimately involves me. I'd be the ultimate decision maker.”
StatGov1 also added “I've got responsibility for security within my own organisation
… and secondly, I've got responsibility for security around the services that we offer
to our customer base.” FedGov2, as a security leader within his organisation, was
required to set strategy as part of the role, stating “I’m engaged in the upper tiers of
the strategic direction setting for ICT security, having recently been a co-author and
publisher of my organisation’s ICT Security Strategy.” EnerCo1 went one step further
by not only setting the strategy but managing its operational implementation, being
responsible for “everything from building the strategy, implementing the strategy,
updates to the board (six monthly), … audit committee, general board, and the
executive team.”
176
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
In large and complex organisations with multiple divisions, each division may have a
different risk appetite, which all need to be considered within the context of setting
“I’m responsible for the overall strategy, at group level, for my organisation,
are all very different in terms of their risk appetite. My role is to pull together a
Maintaining relationships with key stakeholder groups was a recurring theme when
my remit. If you talk about what it means, strategic level information security,
to each of the group executives and the board, I’d report to the risk manager
on a quarterly basis around our security program and how it works and what
By way of an introduction, this section analyses the concept of risk appetite within
organisations and its properties. This section does not analyse how risk appetite can
Outsourcing Constraints section. This section also reports on findings from the data
Most organisations would have their board of directors or equivalent define a risk
appetite so that operational teams can then make decisions within a risk
177
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
stated “risk appetite guides all of the decision making that you do in running a
business”, continuing with an example of “your risk appetite would guide the choice
The risk appetite then guides operational decisions, including major ones, as FinCo1
stated
“in my organisation, there’s always a big focus on risk appetite. Every time we
risk. We cover service risk. We cover data risk, so that’s quite a mature
process.”
As well as guiding the direction of major decisions, the risk appetite guides
have very well-defined risk appetite statement, and … if the risk can be
managed down to a medium level … risk according to the rules for risk
definition, then the local business unit can decide whether to accept the risk
or not … but if we find that … it can only get down to a high or an extreme risk
In a variation of this concept, although a common approach was for boards to define
decisions based on risk versus reward, it is hard for these units to quantify the
178
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
boundaries of the risk appetite. ITCo3 saw issues with measuring risk appetite so
“Risk appetite is a phrase that gets used a lot, but when you actually push
what risk appetite is. Risk appetite makes sense in an insurance, actuarial
context where you have really good data … and you can come up with really
nice numbers. Risk appetite in a cyber security context is just really hard. The
story that’s been in the press today – I think it’s the Maersk shipping line – I
think it cost them $300 million or something for their NotPetya infection earlier
in 2017. Their ability to have quantified that beforehand is nearly zero. … So,
if someone had said beforehand tell us what your risk appetite is, well, you’ve
got all these systems that haven’t been patched in 60 days or 90 days. Is that
process is going to lead to a $300 million loss. Is that within your risk
appetite? Of course, it’s not. … So, it’s only in retrospect that anyone sees
processes throughout the organisation, as StatGov1 stated “risk appetite guides all of
the decision making that you do in running a business.” FedGov1 confirmed, “if
you're … lowering your risk, no matter what risk it is, it's got to be a better way to run
information to increase its security. FedGov1 used a few approaches to reduce the
“The only way you can actively decide is to look at what information you've
got now that you're collecting, classify it, see what risk you're running, and
then decide how you can either migrate that risk by getting rid of the
179
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
information, if that's possible, or not collecting it, and/or put the mitigation in
place.”
A strong security culture is the result of repeated employee actions which can be
shaped through education, training and awareness programs, as well as policies and
procedures which must be followed by staff. ITCo1 stated that on “culture … it's one
thing to put things in policies and procedures; that's useless if you don't manage it.”
Some organisations had a strong security culture, and some didn’t. FinCo1 admitted
“We’re not defence. We’re not government, and we’ll never have the luxury of the
culture that they have when it comes to understanding and treating classified data.”
“you need to have really good controls around document handling, marking,
and labelling standards, and you need to have that embedded into the DNA of
the psyche of the end users, so when they create that documentation, they’re
doing the appropriate labelling and handling at the very lowest level.”
The reason that a strong security culture is important is that humans generally do not
Humans can make erratic decisions, based on how distracted, busy or emotional
they are at the time. Humans are a vector that attackers can focus on in social
engineering attacks that attempt to conduct a security breach by enlisting the aid of
engineering is what a lot of attackers rely on to get in the door, and so the
180
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
ResCo1 observed the, “impact of culture on protecting data. … You can have all the
frameworks, but … you’re relying on the guy at the end of the keyboard to decide that
continuous improvement activity that should exist. You actively shape it.”
A security culture begins at the top and organisational leaders must set and shape
the culture with their own actions, as AvCo1 stated “culturally, the tone from the top is
crucial”. TelCo1 observed “The culture of board and Executive Committee … and the
ability to actually morph and change the culture in a business to meet the changing
and evolving technologies and innovations.” Culture comes with its challenges
however and to avoid core rigidities within an organisation that prevent it from
adapting to change, TelCo1 stated “You’ve got to have a culture of change and
Security policies are the levers by which the governing body of an organisation, such
as a board of directors, can direct employee behaviour from their position and in line
with their strategy. FedGov2 had an entire framework of policies imposed upon them,
At the governing body level, two concepts are shaped, which are strategy and policy.
There are many different types of policies, as StatGov1 gave an example of “a policy
authority of the person we've collected it from” and EnerCo1 gave an example of
“we’ve got an acceptable usage policy.” Policies are used to govern employee
behaviour and within an information security context, policies can be coupled with
stated, “Anything that is classified … will default into a certain retention policy, and
181
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
the only way you deviate from the retention policy is if it’s required as part of
litigation.”
ITCo1 made the distinction that simply setting a policy and forgetting about it does
not have any impact internally within the organisation, stating “it's one thing to put
things in policies and procedures; that's useless if you don't manage it.” It was also
difficult to change policies once they had been set because employee behaviour had
already been set and changing the policy meant changing the behaviour, which
requires effort to learn. TelCo1 confirmed “Always remember, it’s far easier to
policies, stating “One of the things I often wonder about is whether policy needs to be
as rigid as it is because I think a more agile way of working is actually more principle
based than policy based”, continuing with an example of the, “principle of least
multiple times.”
SETA programs are the tools used within an organisation to implement security
policy. SETA programs are reflective of the range of policies that an organisation has
set and intend to shape employee behaviour. The result is that repeated actions that
have been actively shaped by security leaders should result in a strong security
“one of the most important things is … education and awareness from the
board all the way down, and if you can’t affect that in some way, then that
182
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
Education, training and awareness programs are necessary not just for general, end-
“A lot of attention actually needs to be put into security culture, training, and
and staff. You need to make sure they have the latest, greatest current skills
important.”
“All it does is when someone tries to [copy data], it just comes up with a
dialogue box, and they accept that it’s actually in line with the policy. If they
push yes, then it goes, okay, no problem … If they say no, then that just
Technological security controls are used to defend against threats and are deployed
appropriately to protect information with different values. RetCo1 stated there were
“We use a tiered structure [of controls] … if it’s just internal information, we’ve
you have sensitive information, there’s a different level of rigor and additional
security controls … and you need to apply those. We actively test and monitor
those controls.”
organisation can become outdated or obsolete very quickly however. FinCo2 stated,
183
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
“Investing in cyber security controls to also be current then follows on. You
cannot deploy a firewall, turn on all the switches, and say good, that job is
done. That’s not the way it works. You need to stay very current, understand
how that needs to evolve over time to address the evolving threats, and in
order to keep on top of those evolving threats, you need to be very engaged
Organisations use resources in daily operations to achieve their vision and mission,
and these resources are sourced from several areas within the organisation. For
example, StatGov1 used their cash resources to improve their product mix, stating “if
we generate a surplus … that surplus is turned into reduced prices, investing in new
products, new services, [for example] beefing up our security.” However, RetCo1
“Depends on how and where it’s used in the business. If it’s used real-time [then]
stale data that’s a day or two … old, it’s less valuable than data that’s needed at this
outsourcing. If even one condition affects an organisation, then outsourcing may not
be an option.
requirement for continuous information availability, country risk, economic factors, the
external threat environment, industry factors, inertia, threat intelligence, lack of trust,
lack of understanding about what outsourcing is, legal factors, loss of control and
184
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
valuable information. These factors are all discussed in the following sections.
are important because their existence affects how the organisation decides to
approach its information, including storage, use and security. Given all these
cause service interruptions. For some organisations, this risk was too much. FinCo2
was firm when stating, “It’s definitely a constraint. Our expectations are on availability
from the provider. If they can’t provide the level of availability we need, then we can’t
use them.” For an island like Australia, this is particularly pertinent, as FedGov2
explained,
“depending on where your data is held, it only takes one undersea cable to go
down for your whole business to be degraded. And there’s a lot of web-only-
based businesses now, you know, the Ubers of the world, etc., that if they
have a major cable problem somewhere, then half of their customers are cut
off indefinitely”
FedGov2 then summed up with, “considering [there are] maybe two or three major
undersea cables connecting our fragile little nation with the rest of the world, we’re
very exposed.” Other research participants thought ahead to what the impact from a
185
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
“Availability, absolutely, it’s one of our key tenets, is availability. Not from
around sourcing are around availability and uptime. If our internet services
are offline for two minutes, it’s in The Age [newspaper]. So that’s a key factor
for us.”
Other research participants considered the financial cost from a service outage
organisation which, “has got several thousand call centre reps, if their systems aren’t
available, tick tock. Cha-ching. For every 5-10 minutes, 30 minutes, two hours is
millions of dollars.”
In a variation on this concept however, some research participants thought that the
“No, I mean I would think that’s the reason why you would outsource it. You’d
outsource it because it’s much easier to get 24/7 operation and continuous
monitoring when it’s outsourced, and you’ve got around the clock support and
StatGov3 agreed, stating, “If anything, you’d probably get better availability out of an
outsource service provider than internally, so that might be a driver for wanting to
Country risk is the risk of procuring outsourced services from vendors based in one
country over another country that might be deemed more or less risky. FinCo1 gave
a brief explanation, with, “Country risk is … what we call it specifically, but that aligns
to economic, political, and all that kind of thing.” FedGov1 confirmed “We're looking
186
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
at something now where it won't be hosted in Australia, but we've got the choice of
where it will be hosted. But if it was in China or Uzbekistan then we wouldn't do it.”
EduCo1 agreed, stating “If it’s a third-party organisation that sits in a communist
country … Or in an organisation which does not abide to human rights, we might not
“I mean, today in the paper, there is this … suggested premise, that the White
loggerheads with the US. … national security issues will definitely come into
the decision to outsource and what that means to the company and the
stating,
“Well, there are two types of outsourcing. There’s what I call IT Outsourcing,
outsourcing infrastructure. We have a saying here in the US, it's like, your
mess for less. The business process outsourcing is like payroll, you outsource
the entire payroll process to a third party, and it's really in their interest and
yours for them to improve on the process to make it more efficient, and that's
a very different kind of a relationship. And they all have economic models
where it makes sense to either outsource and not outsource. So, economics
do play a role.”
187
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
“the reality is that some of the outsourcing deals we’re looking at now,
parts of their operating business into someone else’s hands. And given that a
lot of the tech industry is not profitable and nowhere near being profitable,
we’re only a dot com crash away from a lot of these companies disappearing.
I’m not sure that anyone really knows what happens when one of these cloud
service providers disappears, and they’re just no longer there to actually run
your systems.”
“will reach a point where all of the IT infrastructure inside of that data centre
that's when you start to say, okay, if I've got to refresh this technology, I've got
project, I’ve got to go through all of the cost of migrating to new hardware ...
That's potentially then that opportunity where you look and say, okay, instead
of operating this data centre and then refreshing the technology every three to
The external threat environment might affect an outsourcing decision because the
outsource facilities have security frameworks installed that might appear vulnerable.
188
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
storage if they had a history of being breached.” This vulnerability might be due to
facilities, as ITCo4 explained “Some will have only a baseline level of security and
ability to protect against modern threats. There will be other providers who … have a
whole range of additional capabilities.” Another source of threats, that could affect an
facility alongside another customer that is storing very high information there. ITCo3
explained,
“one interesting aspect of that is the contagion risk, or in fact, the collateral
also the outsourcer for very, very high-risk organisations, then, in a sense, I’m
As well as determining threats that arise from outsource facilities being located in
high-risk countries, organisations should also consider threats that arise from the
“There are certain parts of the city where you wouldn't want to have your information
assets stored, if only because it's difficult for employees to operate there effectively.”
risks as possible.” Some organisations looked for specific threats, with EduCo2
stating
“We constantly look at our [control] settings based on the external threat
189
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
… look at the specific threat actors that might want to gain access to that
sensitive information that could be sold on the web for monetary value? Is it
something that we could be held for ransom on? So, you look at the threat
“Threat model is let’s say you take a solution or technology environment, you
do an analysis of what all can go wrong with it, all of the different types of
threats to that environment, the threat actors, and what are the implications of
Within the organisation, external threats then affect the organisation in two ways. The
first is that organisations assess the external threat environment and then implement
from those threats, as AvCo1 stated, “We operate in a high threat environment, so
we take that as given and then increase the controls based on the value of our
information.” RetCo1 summed up by stating “The higher the classification of the data,
the higher the threat to that particular dataset, the more controls you need to apply.”
The second is that then organisations monitor their information and threats, and
“There’s the theoretical part of it and the reality. I think the theoretical part of it
assets and understanding their information, and they’re looking at the threats
to that information and coming up with risks and designing controls to address
190
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
those risks and everything else. In practice, it doesn’t work that way. In
One consequence of information having value is that value can change depending on
who is assessing the value. An organisation might assess the value of information
differently to a threat actor. This can affect the level of controls put in place to protect
the information which can affect the success or otherwise of a security attack. FinCo3
explains, with,
and what the threat actor thinks is valuable. … That then means that
Although all research participants agreed that threats affected the security controls
they implemented to defend the organisation’s information from a breach, most did
not perceive that the value of their information was also affected by threats.
PharmaCo1 stated,
value levels. The fact that somebody wants to steal it is a given. I mean, I
because that's what they do. It's our job to figure out a way to make sure that
Organisations did not raise or lower the value of the information dynamically in
response to threats, but it’s possible that they should be, according to MgtCo2 who
stated, “in my personal experience, they’re not that mature”. ITCo3 explained,
“I think most organisations are determining what information they hold based
on the business need for that information or the value of that information. … I
191
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
don’t think organisations, yet, are mature enough to say that … because of
the threat environment, holding that information is bad for us, so we’re not
going to. I don’t think anyone’s mature enough to have that discussion yet.”
outsource information, as some industries had a higher level of threats than other
especially in the cyber space, and the retail sector will have a different view
“I can think of some industry factors and they would be – there’s some trading
spend a lot of money getting a bed of fibre networks to the trading centre so
that they can execute faster trades. That would be a situation where storing
something offsite, or information offsite, would slow them down, and that
would be an industry factor. So, it would be a valid argument for storing it all
expectations, stating,
“It strikes me that industry factor is probably a proxy for some combination of
192
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
some parts of the world, and community expectations, in that order. So, the
would be slightly weaker, but very industry specific, and then community
expectations the weakest direct transmission, but over a long enough time
period, is a very strong constraint. Then those three things would then factor
into whether or not your industry is more or less likely to outsource and where
PharmaCo1 pointed out that their industry was becoming more highly regulated,
which extended beyond them to include their suppliers. The corollary to this is that if
“we’re a highly regulated industry and the various drug agencies are now
taking an interest in cyber. And by transference, they also take interest in the
folks that operate systems for us. So, in as much as we have to be validated
made an organisation a bigger threat target, then use of an outsource facility could
193
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
5.2.2.6 Inertia
Fear of the unknown can cause inertia, preventing organisations from using
outsource facilities. FedGov1 confirmed “there is a bit of inertia … because it's the
inertia can be caused by employees who might fear for the loss of their jobs if
“We’ve certainly got clients where we’ve offered offshoring some of their
work, and they don’t want to do it because it’s too hard. It’s only too hard
because the lower level people make it hard because they don’t want to lose
their jobs, and they’re worried that if you make it easy, then with price points
FinCo2 agreed that process and fearful staff can cause inertia in the transition to an
“Going through a process to obtain the right level of certification and approval
that actually an outsource provider is safe enough to use. … The process can
be too onerous, or it’s just too hard, and maybe that’s somehow linked to the
internal politics.”
StatGov3 thought that rather than employees experiencing the inertia, the
management layers could cause it based on their drive, experience and maturity,
stating “Probably lacking strong leadership. You can have paralysis by analysis …
You can have nobody prepared to put their hand up and take responsibility for it.”
194
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
Overall, the employees and management both needed to embrace the use of
external outsource facilities and this required a shift in mindset and therefore the
moving away from that now. … There is a level of change that is required
370 IT staff here. That doesn’t mean we’re gonna do them out of a job. We’re
going to retrain them on other things. But there’s a level of cultural change the
intelligence and the presence of some targeted and concerning threats may affect a
decision to outsource information. FinCo1 was adamant when stating “We watch the
“we engage with over 120 different organisations on our intelligence sharing
That includes levels of law enforcement and government, through our peer
financial services sector, and other non-sector industry bodies that also have
195
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
alive.”
research participants. AvCo1 stated, “I think that probably the most important part of
moving to cloud is being able to determine that cloud provider is somebody you can
trust.” Trust however was not easy to define. FinCo4 thought that the modern
rethink to the way we approach trust. It’s incredible to think that blockchain
“Trust. The … ability for us to assure ourselves that the provider does the
things that they say they will, their willingness to give us visibility and control,
and right to audit. The simple test is: if we can’t do with the provider what we
The type of outsource facility that was being used by an organisation made a
difference to the level of trust placed in it. An outsource vendor that shared partial
very different to an outsource vendor that provided only external ICT infrastructure.
RetCo1 disclosed their level of trust in an outsource vendor that managed their
information, stating
196
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
consume in any way, shape, or form, and I can’t see the benefit of that, to be
However, RetCo1 had no issue with consuming the services of an external ICT
infrastructure supplier, stating “I would have no hesitation to … put sensitive data into
the public cloud. With the right level of controls, I would.” RetCo1 balanced this
however by disclosing that they only deal with ethical cloud suppliers, asking “Are
they ethical organisations?” FinCo1 recognised the disparity between buyer power
“If you think about the AWSs and the Microsofts of the world, they’re not
going to be as open, so we have to work a lot harder to get visibility. It’s not
good enough for AWS to tell me they’ll do something. They need to show me
how they do it. And if they can’t, then I need to build a control to mitigate the
“You have to trust your outsourcing partner to ensure that those employees
are not criminals. We have a saying here in the US, trust but verify. So, if you
don't put it in the contract, odds are the outsourcer is not going to do anything
EnerCo1 stated, “you can’t outsource governance, so … make sure the organisation
that’s doing it for you is actually abiding by what it’s saying it’s doing in the
contractual controls”, continuing, “a right to audit … just doesn’t work in the contract.”
The problem was scale, as EnerCo1 elaborated “if they have like 100 customers, and
every customer says, I want a right to audit, well, that [is too hard].” Instead, EnerCo1
posited a different approach, stating, “if you come up with a monthly reporting matrix
and say … just report on these key metrics … like, how many times do you check the
197
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
admin passwords”, then with enough metrics, this can have the same effect as if the
that they don’t have the skills or expertise in employees to understand it. This
FedGov2 stated,
“The other factor, I think, that prevents some organisations from outsourcing
is they don’t understand it. There’s a lot of buzz words out there. There’s a lot
of sharks who are happy to sell you an Amazon Web Services instance, but
not actually tell you what the benefits are, and how you manage it, and how it
works. They’ll just give you the smoke and mirrors component.”
Research participants gave different answers about legal factors that may constrain
an organisation from deciding to outsource, which related in two main areas. First
were environmental conditions such as statutory and common laws of the country,
regulatory bodies, and ordinances that regulated organisations. Second were specific
contractual conditions between two parties seeking to provide and consume products
and services.
confirmed, “Legislative compliance would be [a] reason you may not do it”,
continuing, “we're starting to play in the cloud. … we're … deciding how we do that in
a way that allows us to comply with legislation around privacy.” As a supplier of ICT
outsource services, ITCo3 was required to “sign contracts that require us to only host
198
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
things in Australia, or not subcontract any hosting.” On whether legal factors can
office under AGs (Attorney-General’s office), and I think with all the TSSR
will be requirements under that, that will obviously impact on what we can and
can’t do.”
was concerned most with a “Loss of control. Inability to establish contracts that give
you the level of control that you want or that you think you need.” FedGov1 confirmed
“if we can't get the contractuals right and the protections right then we can't do it”,
continuing, “they’re either not complex enough or too complex. It depends. I’ve seen
examples of both.”
StatGov1 gave an example of a time when they could not gain agreement on the
terms and conditions they were after, requiring an escalation to the board of directors
“We are attempting to negotiate a contract with a cloud vendor … and I'll be
taking that to the board … because there are some risks associated with that
contract that we simply cannot mitigate because the cloud vendor have
negotiated as far as they're willing to negotiate. … One of the things that they
security around our systems or data. Now that's not to say they wouldn't tell
us, but they won't sign a contract saying that they must.”
199
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
Reaching agreement on liability between parties was also a key consideration when
“Lawyers are always worried. Liability becomes the number one issue. If a
provider says, yeah, if we have an outage for more than five days, maybe
we’ll give you a free month of our service. No, you may have just caused us
$10 million worth of lost business. So, $1,000 worth of your service is not
“I think some of that needs … a culture shift. This idea that an organisation
“Once they get … legal advice, … in the past, they were tied-in for a certain
number of years and a certain amount of money, and it was really difficult to
thing as minimum spend. They're not locked into a contract. They can cancel
The concept that organisations lose full or partial control over their information or ICT
environment emerged from the data as a major concern. StatGov1 was concerned
about, “loss of control over things that you feel you need to have control over … if
somebody else gets in and sees it, … who wasn't authorised, you'd want to know
200
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
risky, and I'm not talking necessarily about service levels and all those sorts
of things, but moving it out of the known space into something else is
somebody who tells me they’re going to store my data securely on my behalf. That’s
There might be some valid business reasons that organisations don’t want to lose
control of processes or information, including that they form a core competency for
the organisation. ITCo1 confirmed, “there's a lot of reasons you wouldn't put some
things out. One of the main reasons would be it's a core competency.” EnerCo1 gave
then the Florida company went bust, and they found that the data was
vendors may not be up to the same level of quality as what is adhered to internally.
“the factors that would affect us are inability of the proposed vendors to provide for
StatGov1 stated, “the sanctity of the data, for example, if somebody else gets in and
sees it, … who wasn't authorised, you'd want to know that.” ITCo4 gave examples of
customer questions about the level of quality in their outsourced services, stating,
201
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
talk about, so what are the logical isolation mechanisms and what level of
assurance can they get? … being a multi-national, how does that work, and
where are the services supported by? … There are questions around, are you
on the certified cloud services list? At what level are you on the certified cloud
A few research participants held a perception that increased security controls can
much security you can … put in place …, and you also have trade-offs from a
usability productivity perspective if you put too much security in place”, continuing
with an example,
“So, this morning I got mail from the Auditor General's office. The Auditor
General doesn't just send you mail; they send you a mail message to say that
they're sending you mail, and to get access to it, you enter your email
address and a password. And since I don't get that much mail from the
frustrating.”
Another key concept that emerged from the data as a constraint on an organisation’s
decision about whether to outsource or not were political factors. ITCo1 thought that
202
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
stay away from outsourcing if … if they are going to have our data offsite somewhere
in another country.” StatGov1 stated that political leaders need to engage with more
security education, training and awareness programs to fully appreciate the potential
outsourcing of data on the basis of a sense that that makes that data more
good understanding of what security mitigations have been put into place to
ensure that doesn't take place. So, it's a perception issue at the political end.”
country hosting the information, stating “If you’re outsourcing in a country where
there’s political instability, you will not.” MgtCo2 considered that political factors
included a nation’s intent to surveil other nation’s information and that cyber
“Politics always plays a role, but … with how cyber is now high on every
place. What’s happening across US, Europe, China, Australia. I don’t think
cyber is something that is now in the shadows. I think it’s very much
mainstream, and there is a large political agenda behind it as well. So, politics
ResCo1 considered that outsourcing decisions were not affected by political factors
“If you’re operating in a certain jurisdiction, and the number one outsourcing
203
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
“In Australia, for example, within government there’s a cloud-first policy. So,
there's less risk. … You're not investing multiple millions of dollars into a
project, which goes and buys a whole bunch of infrastructure, which then
doesn't work … I think we're seeing more of a shift to outsource services from
including disaster recovery. FedGov2 had a strong business resilience program that
breaches, stating,
“We have tools that we’ve developed to maintain the integrity of our external
facing websites. If they ever get compromised or defaced, then they get taken
back to a last known good state immediately ... And we’re very heavily
“AWS has … an acceptable use policy, and if that is breached, they have the
right to terminate the service, which is okay except it's not clear that they'll
just terminate the service of the organisation who has breached their
acceptable use policy or an individual in that organisation who has done that,
204
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
and they may terminate the service for all of us. That wouldn't be a good
thing.”
real routine thing like HR records, then people aren’t too concerned. … But if
there’s $5 billion in payments that didn’t get done across the country or
system that, if I move, I basically have to start again, and I lose it all.”
quite strongly. StatGov1 shared, “we're going through the throes of deciding how we
Although the privacy legislation was very clear to most research participants,
FedGov2 related a story about colleagues in other organisations not being as aware,
stating,
“A lot of them aren’t considering the privacy factor. I’ve spoken to some
industry partners around similar things, and as soon as you mention the
Privacy Act, they go the what? And they’re not even aware that some of the
factors that could or would prevent you from going to cloud services is
205
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
actually the Privacy Act, not your own internal strategies or your own internal
business decisions. It’s just the protection of that personal data going into
considering outsourcing options, FedGov1 was emphatic when stating “If it doesn't
meet regulatory compliance, we can't do it. It's off the table.” ITCo3 stated that the
GDPR, the Privacy Act.” If an organisation discovers that their outsource partner was
PharmaCo1 stated, “data residency and sovereignty laws … We have had situations
where we have had to end agreements with outsourcing partners due to the security
concerns.” ITCo4 extended compliance from not just assessing the outsource
and ensure that not only does the outsourcer meet their obligations
underneath the regulatory framework, but can the customer, can the
organisation, also meet its own regulatory obligations within that service?”
ResCo1 identified that specific regulations can drive different behaviours. Privacy
“It depends on if it’s privacy related stuff. … So, if it’s outsourcing our
infrastructure services, then it’s not so much of an issue. But if it’s outsourcing
little bit of a concern because then you need to look at is this a multi-tenanted
206
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
sure these things happen? Who owns the risk if that happens? … so those
kinds of things come, then you start losing the value of outsourcing.”
On maintaining a good working relationship with the regulator, FinCo2 saw regular
two-way conversations and updates with regulators as the path forward to preventing
“Anything we’re looking at doing …, we’ll talk to the regulator in advance, and
say we’re thinking of doing this, letting you know it’s coming. And as we go
there’s constant dialogue so that we don’t turn up and say, oh, look what
we’ve done, and they go, oh, we’re not happy with that.”
organisations would have zero risk appetite for legal or regulatory compliance
breaches.” Most boards or equivalent have formally defined a risk appetite statement,
in the risk appetite statement, so that it is clear for all employees, and they can make
The board of directors or equivalent in a public organisation will typically set a risk
appetite as part of their risk management and governance processes. The risk
appetite sets the limits of risk that the whole organisation will tolerate, and delegated
levels of authority for approving risk below that by executives and management.
ITCo4 confirmed,
207
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
enterprise, is how do they effectively assess that risk and then determine
As ITCo4 identified, the challenge for consumers of outsource services is that the
storage of information and the protections put in place to secure the information are
informed decision about … what is the residual risk, what are the mitigations
and compensating controls to then feed that into that decision around risk
appetite.”
StatGov3 stated,
“if there was PROTECTED or … TOP SECRET information, I expect that the
risk appetite for putting that out in a general cloud would be not high. Yet I
come from financial services where they’re actually able to quantify risk
appetite pretty much down to a dollar level, so then that’s really making an
informed risk decision. I think risk appetite is a really useful lever to have in
StatGov1, a CEO, gave an example of a time when a risk was identified within the
208
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
“We are attempting to negotiate a contract with a cloud vendor, … and I'll be
taking that to the board … because there are some risks associated with that
contract that we simply cannot mitigate because the cloud vendor have
taking that … to the board to say here's a risk that I'm gonna be willing to sign
Within the context of deciding about whether to outsource information, the ownership
TOP SECRET information, I expect that the risk appetite for putting that out in a
general cloud would be not high.” FinCo1 perceived that information value was the
foremost concern, stating, “really, that’s key. Before we even look at those other
stating,
“A lot of the big banks are going to cloud services for a lot of things that they
do, but that really sensitive information, you know, the user names,
passwords, credit card details, etc., they’re generally keeping very tightly
security, stating “if the data is super valuable you may want to put it someplace
outside because it's more secure to do so.” ResCo1 gave an example, stating,
209
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
outsourced provider facility that we have full visibility and assurance that it’s
internally.”
outsourcing, they just need to look at, okay, based on a certain classification
of information, what are the controls that need to be put in place to be able to
and those obligations that need to be in place to protect that information using
Information might have such high value that it is irreplaceable. Security controls such
legal patents give the information owners the right to legal recourse to defend against
infringing the patent however the information is made public as part of the patent
process. ITCo3 perceived that irreplaceability of unique information could affect the
“I guess if you look at … look at Space X in the US. Space X doesn’t patent
anything, basically, because their belief is it’s really hard to invent what
they’ve invented. If they patent it, they’re basically giving it away. The people
who would likely be knocking off their IP are nation states who aren’t going to
care about the patent anyway. So, they’re better off just not patenting it. I
would guess they are not hosting that in some random cloud environment on
210
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
the internet. If your IP is genuinely that much of – if you lose it, then it’s over
kind of scenario, then, yeah, it’s going to be like the recipe for Coke and the
recipe for Big Mac sauce and keep it locked in a vault and systems that are
bringing them to market, so the formulas for the new drugs are highly secret, and the
organisations that do this are clinical CROs, but that information essentially is
tokenised and anonymised when it’s processed. And even the compounds
that we're testing, those are tokenised as well, so the risks are relatively low
enablers also became apparent after the research data was analysed. These
security controls, and the size of the organisation. These are all discussed in the
following sections.
211
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
A number of these concepts, for example money or organisational size, are important
because their existence affects how the organisation decides to approach its
information, including storage, use and security. Given all these concepts positively
into cloud-based storage is not straightforward and there are many factors to
“when we first moved our infrastructure out, I had to get all the assurances I
could about the business case, RFP … I got an independent review from
board meetings”.
ITCo4 considered that due diligence had to be extensive and coined the term SOS to
“[SOS means] Security of Supply. The first thing I do is actually make sure the
company that we rely on has got a strong history, and your due diligence
looks at not just the organisations and its financial viability but those that
nationals”
appropriate level of due diligence then allowed the organisation to negotiate better
212
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
“You have to do your due diligence so you understand how it's configured and
how it's supported, maintained and secured, but ultimately, then what you do
is devise a contract that says, okay, on the basis that you've told me this is
all of those things, and if you don't, you're in breach of that contract.”
MgtCo1 agreed that having a right-to-audit in the terms and conditions of a strong
“If you’re outsourcing certain things, make sure you have a right to audit and
data, where are the data … who [has] access to it, which of the clients have
the same storage, always know where your data is. … Do your proper due
Organisations perceived that, unless it was related to core business, the burden of
hosting information in-house can seem like a waste of time if their primary purpose is
employees and physical parts, such as a dedicated floor space, a secure physical
administrators. Instead, RetCo1 stated that they use an outsourcing partner because,
“There’s obviously cost benefits, potentially, in that I only pay for what I use.
maintenance. … I can focus on protecting the data which is the only thing I
really care about. Honestly, I don’t care about anything else apart from data.
It’s menial tasks to maintain a server appropriately, it’s really painful. It’s much
213
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
5.2.3.3 Budget
Budget or the lack of it can affect the decision on whether to outsource or not, as
confirmed by MgtCo2 “It depends on how much money they have to spend on it”.
Financial resources are limited within any organisation and constrained budgets
budget setting decisions and sometimes they don’t, leaving these decisions to
“in a budget discussion that we had last year, there were budget cuts that
were imposed that meant that some risk treatments that were treating
extreme risk were going to be delayed. So, when that message was taken to
A predilection for OpEx over CapEx affected outsource purchasing decisions within
organisations. Organisations may not need to own the IT infrastructure that is used to
host their information, especially if they can lease the same platforms, so the need
for capital expenditure to purchase and own the infrastructure is diminished. ITCo1
stated, “The nature of our business … doesn't require any capital expenditures.
We're all operational expenditures. Our costs are our staff, and every other cost is
“In the security space, we’re pushing a lot of cloud tools because then it
keeps current with all the rest of it, but that affects OpEx, whereas if you go in
onsite, then it’s CapEx, but sometimes, going CapEx is more attractive than
214
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
Security controls protect information from threats, and ITCo4 gave a few examples
such as “multi-factor authentication, … role-based access controls for staff, and the
ability to do things like, for email, implement … Dynamic Tag Management”. A key
“the outsource partner should be mapped into the security process, the policy
an outsource partner we want to make sure that they at least are, a) aware of
PharmaCo1 perceived that over time, outsource vendors are maturing and getting
are very security aware. … outsourcing partners have better security controls than
we have because it's their core business.” Flexibility may be required to bring
and an organisation should have the option to demand that certain security controls
appetite … might mean that there are additional things that they need to have
“most organisations try and layer their security controls for multiple standards.
I think there needs to be a fine balance between technology controls that are
215
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
been an issue, where organisations get caught up and end up spending too
because either the outsource partner refuses to allow visibility into the current state
of their security controls, or because they use their own outsource suppliers in back-
to-back agreements and don’t have visibility themselves into what security controls
are used. This reassurance as to the level of security controls used may sometimes
“when you outsource … you lose the ability to implement technical solutions
… what they should be looking for when they do their due diligence and their
risk assessment process [is] which ones actually provide them the visibility
The key concept is building trust, where an organisation must be able to trust that an
outsource partner has equivalent or better security controls and commits to using
them to protect the organisation’s information. Another way that an organisation can
illustrated with,
“We have used criteria from the Cloud Security Alliance to help define which
cloud providers meet a certain level of criteria. You know, all cloud providers
aren’t created equal, so rather than saying what is the information that you’re
going to put in the cloud, for example, we first ask the question, what is the
vendors, on how to deliver assurance over third parties. To sum up, FinCo3 stated,
216
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
“at the highest level, the key thing you need to consciously build if you are
That, ideally, consists of two pieces. One is a risk assessment activity at the
beginning of the relationship with a third party … And … the second thing is a
After time, the relationship with the outsource partner may come to an end for a
allow data portability and the capability to respawn a website, database or application
that uses the information, as part of a disaster recovery program. Disaster recovery is
“be able to take back-ups, and to have data portability so that if something
happens inside the outsourced environment, they can potentially bring that
data back into their on-premise environment, or some other service provider,
StatGov2 agreed, stating “one of the very important control clauses in the contract
should be the exit clause, [where] you should get your information back, and it should
The size of an organisation does not affect the number of security attacks it suffers,
217
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
structure, because larger organisations require and can afford extra employees and
“So, it largely depends on the size of the organisation. So, for the largest
Security. And then, as they get down into the sort of mid-size, it tends to be
The size of an organisation also affects the allocation of resources within it, as
smaller organisations with limited resources need to direct these towards higher
infrastructure, stating,
“you don’t have to maintain those skills inhouse, and you don’t have to pay for
it. You’re paying someone else to do all that, organise the expertise and carry
car widgets … also need to be experts in securing their systems because this
that’s not what they specialise in. That’s clearly the benefit of outsourcing”
partner means that efficiencies in scale and scope can be realised, thus conserving
“you could get someone else to deliver that capability for you [and] because
they operate on a much larger scale, they could be dramatically better at it.
There were several concepts discovered from the data after analysis of the
218
CHAPTER 5: FINDINGS – ORGANISATIONAL CONTEXT
the conceptual model in Figure 5.1 depicting the major concepts together with their
relationships. Models include definitions of concepts but do not fully justify their
relationships or boundaries, and are often the basis for developing theory (Wiesche
et al., 2017). In all, the student researcher created 35 different versions of this
diagram after integrating memos and analysing, before settling on Figure 5.1 as
offering the best explanation of the concepts involved and their relationships.
This chapter describes the findings from analysis of the data, providing a rich
description of the concept of information security strategy, analysed for its properties
and dimensions, noting any variations throughout. After the data were analysed,
related analyses were aggregated into categories, which were integrated and then
219
Chapter 6: Findings – Approach and Impacts
The aim of this chapter is to describe the findings after analysis of the data, providing
a rich description of the concept of information security strategy, analysed for its
properties and dimensions, noting any variations throughout. After the data were
analysed, the analyses are aggregated into categories, integrated, and interpreted in
term that was adapted from ITCo1, who stated “we've taken the deliberate approach
provider. There are situations where an organisation might decide to not hold the
similar way, an organisation can decide the value of the information that it owns, from
low value up to high value. The previous section has outlined the relationships where
220
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
Figure 7.2.
In this section, four distinct approaches to securing information are identified in the
data, which are securing valuable information, evading trouble, getting help, and
accepting the risk. These concepts relate to approaches taken when securing
information within the organisations that were studied in this research and are
where these four concepts affect strategic impacts on the organisation are
Generally, valuable information must be secured, which affects where it gets stored.
The first step is to identify valuable information. FedGov2 offered, “you have to look
at all your data holdings and make very conscious business decisions about what is
the most highly protected data that you have and then control access to that”.
The next step that organisations take after they have identified valuable information
and determine whether or not that information needs to have additional protections
because of the nature of the information”, and ITCo3 added “organisations are trying
to create a sensitive data environment so that they can keep all their sensitive data in
a relatively restricted set of systems and environments that they can apply more
controls to”. StatGov1 agreed “you would have greater levels of security around it,
information required secure infrastructure with security controls, because “to store
221
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
valuable information, you probably have to fortify your defences, fortify your
infrastructure”.
information by storing it internally. ITCo1 agreed with the next step being to store
“You could obviously put it in a secure area. You can have various privileges
setup by password security. You can use encryption on accessing it, so you
ITCo3 agreed and extended by stating that information storage systems should not
even be connected to the internet, to reduce the risk of a security breach, stating,
“If your IP is genuinely that much of – if you lose it, then it’s over kind of
scenario, then, yeah, it’s going to be like the recipe for Coke and the recipe
for Big Mac sauce and keep it locked in a vault and systems that are not
internet connected.”
FinCo4 kept their valuable information internally and identified budget as an enabler
environment? … Our internal data centres are more secure than what can be
222
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
To summarise this section, removing value from information reduces impact if there
is a security breach. There are three mains to achieve this reduction in information
valuable information in the first place, tokenising it, or deleting it, which results in
reduced costs and increased security of the organisation. ITCo1 confirmed “we've
taken the deliberate approach of devaluing the information that we have. What I
mean is, by taking away the risk, taking away the importance, taking away the
impact”. ITCo3 also agreed that devaluation made organisations more secure,
stating, “in the same way that a bank that holds no money is a less attractive target to
rob, yes”. This relationship between devaluation techniques positively affecting the
The findings revealed three clear techniques that organisations actively use to
reduce the value of their information. First, ITCo3 reduced information value through
tokenisation, “you tokenise [information], so you don’t actually have the data
anymore; you have tokens that effectively refer to the data”. Second, organisations
often make the deliberate choice to avoid holding valuable information in the first
place, as is the policy of StatGov1, “we don't deal with anything that is
PROTECTED”. Third, FinCo1 found that lowering information value can also be
surface area, reducing risks in lots of ways”. These three main approaches to
6.2.2.1 Avoid
Organisations can actively decide to avoid holding valuable information to reduce the
risk of impacts from a security breach. ITCo3 confirmed that avoiding holding
223
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
stating,
that, which is rather than take payments yourself, use PayPal or just
outsource the whole thing. Just get rid of that function so you don’t have that
6.2.2.2 Delete
The volume of information held can sometimes be reduced to lessen the impact of a
security breach, as StatGov1 offered “not that I'm afraid of security in the cloud, but it
seemed easier just to move it or delete it.” ITCo2 agreed, stating, “I have taken a
number of exercises, … where I go through our shared drives of client work and
remove that … to reduce the risk of that being out.” FinCo1 also noted that reduction
of volume of information reduced the risk of a security breach, stating, “Just purely by
removing volume, you’re reducing surface area, reducing risks in lots of ways.”
it's costly to store. You have compute, you have storage costs, you have
processors that need to be maintained just to archive that stuff. If you can
destroy it, well, you don't have those costs either, so there’s a win there as
well. Companies should actually delete a whole lot more data than they do.”
FedGov1 was bound by law to retain information for various periods of time but
agreed that not deleting information increased risk of a security breach, stating,
224
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
“we have Records Acts, for example, we've got to keep some information for
a certain period of time. So … to be really quite honest with you, we just tend
Internally within the organisation, the person responsible for deleting information is
the data owner. ResCo1 commented, “All of the data that we have electronically, the
data owner has responsibility for it. One of the responsibilities of being a data owner
6.2.2.3 Tokenise
When asked whether lowering the value of information makes organisations more
that. I mean that whole standard is built around that very concept, which is if
you hold credit card data you’re going to be in for a world of pain protecting it.
Whereas if you tokenise it so you don’t actually have the data anymore, you
have tokens that effectively refer to the data, then your life becomes much,
When asked whether tokenisation makes their organisation more secure or not,
To summarise this section, securing valuable information can be more effective when
225
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
experts and current technology infrastructure to securely host information. Its use
depends on risk appetite and trust in the vendor. Outsourcing has numerous benefits
anywhere, these are the advantages of the cloud, evergreen environment, so we're
not having to upgrade things ourselves”. FedGov1 believed the investment required
You should be able to get something that's better than what we can provide with a
the level of competence and hence trust in the outsourcing partner, with FedGov1
sharing “the factors that would affect us are inability of the proposed vendors to
Counterintuitively, in a variation to this concept, concerns about trust did not prevent
outsourcing being a viable option for improving security, as StatGov1 shared “I'm
almost certain that Microsoft's environment is going to be more secure than anything
for large providers to provide much better services than we can ever provide. And in
information with high value, as StatGov1 agreed “if the data is super valuable you
may want to put it someplace outside because it's more secure”. When asked
ITCo3 answered “it can”. This relationship between outsourcing techniques positively
affecting the security of an organisation is important and is labelled P7c in Figure 7.2.
legal factors, and the external threat environment can be constraints on the decision
whether to outsource. Most subjects (80%) agreed that industry factors, political
226
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
being stored outside the organisation was also a major factor, as StatGov1 stated
“third-party information, which we've got a policy around not storing that in a cloud
environment without the authority of the person we've collected it from, or anything
“if your intellectual property is genuinely that much of – if you lose it, then it’s
over kind of scenario, then, it’s going to be like the recipe for Coke and the
recipe for Big Mac sauce and keep it locked in a vault and systems that are
efforts only, which conserves security budget for securing more valuable information.
Information may of such low value that its storage and protection can be
“the information is low value so don’t worry about protecting it. We have this
is: what do we need so that if something goes wrong we’re not seen as being
horribly negligent?”
ITCo1 added “we put decent precautions in place. ‘We've been so sad that this
information got stolen, but we gave best efforts.’ I wouldn’t really get into trouble with
227
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
were basic security controls put in place to defend information against ubiquitous
threats. RetCo1 argued, “You would have a base level of controls that proliferates
throughout the organisation that’s non-negotiable.” FinCo3 also took this approach
but slightly increased the base level of protection around low-value information,
stating
mildly, but not extremely, sensitive, so with a reasonably strong baseline set
of controls. We’ve got a very strong perimeter, as you’d expect from a large
organisation.”
The reasons for this are twofold, one is increased productivity by reducing the effort
correctly classify it, and the other is generally increased security, as FinCo3 stated,
“It reduces the amount of energy that a user has to put in to working out how
to protect information because we’ve done the work for them. I think, too, it
helps hold the rest of the environment to a higher base level of hygiene than
AvCo1 refined the approach by explaining that the security budget should be used
initially for protecting high-value information and then the residual budget should be
effort taken to protect low-value information, explaining “I’m saving money … and
“Everybody’s got limited resources, and you want to make sure that you apply
based on the value of the data. If the value of the data is very low, you don’t
228
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
was perceived as acceptable given the low value of the information, as StatGov3
explained “if it’s got little value, it would be more palatable to have a longer delay in
that this prioritisation towards high-value information might mean that there are
information with no residual budget left over for low-value information, stating,
environment rather than it being static. … You may not get to it just because
you’re focusing all your efforts on the most valuable information. In an ideal
world, you’d have 100 percent controls across everything based on your
policy, but you’re just not going to get to it in time. You wouldn’t get to it from
a cost perspective.”
When asked whether their organisation perceived that minimal efforts to protect low-
value information made their organisation more secure, RetCo1 answered, “Yes, I
do, because then you can actually put the resources where the valuable information
is.” This relationship between minimisation techniques positively affecting the security
benefits are largely strategic in nature, relating to the organisation, not of a security
nature. The benefits are grouped according to whether they benefit the organisation,
229
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
outsourcing. An explanation of all these concepts, which have been identified from
The following are a number of benefits that organisations enjoyed which affect
external stakeholders and the relationships with them. They include maintaining
compliance, reducing the risk of litigation, and avoiding share (stock) price
fluctuations.
To summarise this section, a security breach can affect customer trust, although
StatGov1 took a pragmatic view of the impact from a security breach on customer
trust, which in the context of government organisations would be citizen trust, stating,
“it would have an impact on public trust, that is assuming that the public trusts
government anyway … It certainly wouldn't enhance trust, that's for sure.” FinCo2
thought that the size of the breach affected customer trust, stating, “It depends on
what the breach is …, but if [it was] significant, if we had a Yahoo-sized breach,
In a variation to this concept, ITCo1 did not view the impact from a security breach on
230
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
StatGov3 agreed, giving the reason as repeated security breaches inuring customers
“I think people are starting to become almost conditioned to the fact that there
will be data breaches. I would have said, probably five years ago, it would’ve
been high, but now, there’s kind of even a little bit of an expectation that it’s
gonna happen.”
FinCo3 agreed that customer trust was important but noted that it was resilient, and
history has shown that it can withstand the impact from a security breach, stating,
customers trust them. If anything ever seriously damaged that trust, that
The long-run lesson of the last 10 years of data breaches in the US, though,
quite strongly in the short-term around a data breach. For example, Target
saw a material reduction in revenue right after their data breach became
public, but that cut isn’t typically sustained. The long-run experience of
organisations like TJ Maxx in the US, and I think Target as well, is that after a
reasonable period, their customer trust, in fact, returns to the prior levels
231
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
As well as customer trust issues in the event of a security breach, organisations often
breach, it affects people's livelihoods because it's their work or their health”. EduCo2
placed significant emphasis on the impact to their public reputation in the event of a
you’re dealing with research partners who have certain expectations that your
PharmaCo1 shared that being highly ethical had an impact on their decisions, and
stating,
“It's very high. We're a highly ethical company. … We are very concerned
about breach and what that would do to our brand, and especially the nature
of the breach. So, whether it's patient data or it's donor data, or it’s loss of
impact.”
FinCo2 perceived that the size of the security breach made a difference in the impact
on reputation, stating,
“It depends on the severity and the type of breach. When it comes to
reputational impacts, we talk about things that are visible for a day to a week
in the local press. What impact is that going to have? Negligible … If it’s a
really big thing, … and we’re in the press for months, that’s a different thing.
232
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
can negatively affect productivity or finances, although regulators are usually not too
security breach can sometimes affect that compliance. PharmaCo1 took compliance
very seriously, stating, “That's very significant. A deviation with the drug agencies
could result in a plant shut-down. It could be really serious.” MgtCo2 however thought
that regulatory sanctions were perceived as insignificant, stating, “In Australia, where
we have had privacy breaches, the biggest fines … that were imposed were on
Telstra … and they were sub-million-dollar fines.” RetCo1 perceived that the
regulatory stick associated with the Mandatory Data Breach Notification 2017
scheme, and if we don’t comply with that, there could be compliance issues”.
regulators, as StatGov3 stated, “I don’t think any organisations I’ve worked for have a
risk appetite for doing something that’s illegal or in noncompliance with regulations”.
“We take that very seriously, and we work very closely with the regulators.
So, if there was a data breach, my experience [with] what the regulator’s
233
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
To summarise this section, risk of litigation can potentially have a severe impact on
Although not top of mind for most research participants, there was a risk of litigation
that could affect the organisation in the event of a security breach. FinCo3 explained,
“litigation itself isn’t a primary concern for us. It’s more a side effect of all the other
things that have gone wrong.” FinCo2 perceived that the risk of litigation was low,
and questioned, “Whether it’s litigable … Are there grounds for litigation? So, terms
and conditions tend to protect us [in] how we provide our services. I’d say [the risk is]
low.” ITCo1 also thought the risk of litigation in the event of a breach was quite low,
stating,
“we've been going 12 years and we haven't been sued once, and it's
extremely unlikely that one of our clients is ever gonna sue us. They’d just
FedGov2’s experience however was quite different, stating, “If you leak even one
person’s information into the public domain, generally, they go and find a really good
lawyer and take you to the wall.” PharmaCo1 had also noticed an increase in
litigation, stating, “Yes, we're seeing a lot more activism on the part of attorneys who
are suing companies for breaches because of the effects on either individuals or
share price.” ITCo2 thought there might be cultural differences between countries in
attitudes towards risk of litigation, stating, “In North America, without a doubt, it’s
significant, … and not that high here [in Australia].” RetCo1 agreed, stating,
234
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
To summarise this section, a security breach can negatively affect the share (stock)
share price, as ITCo1 confirmed, “We're a private company, so the price of the
shares is irrelevant”, continuing, “It's relevant if we sell, but in the short-term it's not
confirmed, “A security breach could affect our share price, absolutely it could.”
FinCo3 gave some context about why a security breach affecting share price would
“Share price is a factor in the sense that, as far as I’m aware, the CEOs of all
TelCo1 noted the alignment between a security breach, those directors accountable
in the boardroom, and share price fluctuations, stating, “This whole data security,
data breach, is so pervasive, which is why it is one of the hottest topics on board
security breach would have, stating, “Evidence says that share price takes a short
235
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
The following are a number of benefits that organisations enjoyed which were
internal and related directly to the organisation itself. They include avoiding
so significant, they go bankrupt. This can be for a few reasons such as reputational
damage or loss of IP, but overall StatGov2 agreed with the effect of a major breach,
stating, “You’ll lose the business, go bankrupt”. On loss of IP, ResCo1 stated, “If you
had a very competitive environment, where your IP, your bread and butter, is all in
electronic format, and if you lose that, then you’re going to run out of business.” On
StatGov3 cited the story of Cambridge Analytica misusing Facebook data and then
filing for insolvency, agreeing that reputational damage from a security breach can be
“[one] of the impacts could be that the organisation could go out of business.
If I think of the recent Facebook one with Cambridge Analytica firm in the UK.
Maybe the reaction to that would mean that nobody would want to deal with
236
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
key concern by almost all research participants. FedGov2 was clear when stating,
“I’m an old-school security guy. I started with the CIA, the towers of security,
and if you talk about the CIA, towers of security, then I’m right up there:
“By the nature of a breach, it’d mean the confidential information that I didn’t
want public is now made public, so the confidentiality has been breached. …
know that somebody was there that might have changed something, and it
could impact the availability because they might have deleted the database.
EnerCo1 clarified that the importance of CIA on information however depended on its
utilisation within the organisation, as not all information has the same value, stating,
“It depends on the system because some of them can be low, but if it was a breach
of our [energy] generation plant, for example, that can actually be very high,
catastrophic.”
organisation’s expenses.
237
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
“it would benefit the organisation – it may be that there would be a way to
lower the inherent risk that would be more cost-effective than other ways of
mitigating that risk. So, for example, destroying anything over seven years
old, meaning that data no longer exists, may be a less expensive option than
storing it offsite in someplace secure for a long period of time. So yeah, there
A distinct theme that emerged from the data was the idea that as well as affecting an
reputation. PharmaCo1 confirmed, stating, “It could quite frankly affect individuals
“if information got out, there could be personal harm to people. Not only
reputation to us, but people's reputation… it's not just our reputation, it's
StatGov1 also took the view that a security breach could have a devastating impact
238
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
FedGov2 noted the impact of a security breach on the employee in charge of security
at an organisation, stating,
“in the actual security world, if you’re in an organisation that’s had a major
breach, and you’ve been at the helm when that’s happened, you generally
find it really hard to find another job anywhere else, not in security, at least.”
To summarise this section, in the modern age, a security breach can kill people.
In one of the most serious consequences from a security breach, people can suffer
health problems up to and including death. All research participants agreed this
concept was serious. AvCo1 was clear in stating, “if you look at the ASX top 50
[stock market], we’re the only one that operates with threat to life from a cyber
security perspective. We’d take that, obviously, seriously in that respect.” EnerCo1
agreed, stating, “if it affected, health and safety and environment. … that would be a
problem for us.” StatGov2 gave a range of examples, stating, “loss of life, someone
can die. In a hospital … if they crashed the operation theatre, somebody can die.
Maybe they can hack into a plane and make it crash.” ResCo1 pointed to the recent
precedent had been set and that in this modern age, it was now possible to target
people, stating,
… where people are working. Those things can be affected. It can cause
239
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
That harm machinery causing the failure that impacts other things in the
environment.”
For-profit organisations weren’t the only ones concerned with loss of life, as this had
we take the risk component extremely seriously. When you look at the cost of
losing some personal information that might allow a person to be targeted for
a phishing attack versus losing personal information to the degree that those
people in harm’s way are compromised and could potentially be put in a really
assessment to undertake.”
PharmaCo1 took the view that poor planning could have disastrous security
stating,
“high-risk countries, or even locations in a city. There are certain parts of the
city where you wouldn't want to have your information assets stored, if only
because it's difficult for employees to operate there effectively. They also
240
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
respond and recover from that sort of activity, and that would require
EnerCo1 identified that various resources can have their productivity affected, not
“I’d say generation sites is probably the big thing. I suppose … if [Supervisory
thing.”
FinCo2 held a lot of high value information so for their organisation, security was
terms of protecting data and our information security safety, so for us, the bar is very
high.” ITCo3 agreed that protection of high value information could make an
organisation more secure, however equally thought that lowering the value of
information held made the organisation more secure, “In the same way that a bank
that holds no money is a less attractive target to rob.” ITCo4 thought that most
241
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
provider, provided they've done their due diligence and understands how that
secure.”
RetCo1 believed that taking minimum efforts to protect low-value information made
their organisation more secure because that allowed the redistribution of limited
security budget towards higher priority initiatives, stating, “Yes, I do, because then
you can actually put the resources where the valuable information is.”
To summarise this section, organisations can avoid huge clean-up costs after a
cyber insurance.
Probable loss mitigation involves the preventative actions that organisations can take
to reduce the risk of incurring significant sums of money on remediating ICT systems
organisations will suffer loss from a security breach, stating, “it’s not if, but when.” In
the words of ITCo4, preventative actions help to avoid future costs, stating,
“things like clean-up, marketing, and forensics, and security, and a range of
other activities that they potentially would not have had to spend on should
they have done baseline security and delivering a range of other things
upfront.”
PharmaCo1 acknowledged that the direct cost of responding to a security breach can
be significant, stating,
242
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
“Just the clean-up of a major breach is very disruptive. So, there's the initial
breach, there's the loss of information, and then there's the clean-up. And
then, there are the preventative controls that have to be put into place
afterwards. You can do all of this in a planned way, but what tends to happen
is a breach causes you to rethink everything. You've seen the papers where
XYZ company’s been hacked, and now, they're spending $150 million to
remediate.”
RetCo1 agreed, segmenting the impacts into three separate areas, stating,
the tail could be very long. As soon as you suffer a public breach … you’re
going to have 25 million regulators, auditors, and everybody else and their
dog on you, and the associated costs with responding to all of those …
Secondly, the tail of this in terms of how long people are going to complain or
blame you for something that’s happened to their personal life … could be a
ITCo3 thought that financial loss in the event of a security breach would likely result
in a small sum, however acknowledged that some larger organisations had spent
considerable sums on restoring ICT systems, stating, “the direct cost of responding
to [a breach is] generally going to be low. Unless you’re Maersk and managed to
question then becomes, how can organisations prevent this situation? ITCo4
described it as, “things like unexpected costs associated with a security incident that
… they would not otherwise have had to spend if they'd done the right things in the
beginning.” RetCo1 pointed to cyber insurance as a possible option for mitigating the
243
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
risk of clean-up costs, stating, “elements of that you can obviously insure for”,
continuing,
Advantage
To summarise this section, organisations can suffer significant financial impacts from
The loss of trade secrets or IP can lead to a loss of competitive advantage and
around their digging, their next geospatial data, where the next multiple years
of millions of dollars of mining revenues are going to come from then, yes, it
stating, “Pharmaceuticals put a lot of time into research and development, so IP theft
there would be high [importance]. Even automotive industry and definitely defence
industries as well.” FedGov2 had experience with the effects of organisations losing
trade secrets to well-prepared competitors, stating, “We’ve certainly seen in the past,
244
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
To summarise this section, there are many benefits should an organisation engage in
outsourcing.
There are a range of benefits should an organisation decide to outsource the storage
workload on internal employees, redundancy and resilience, and reliability. They are
The nature of cloud-based ICT infrastructure means that users can access to these
systems from anywhere in the world. StatGov1 clearly saw some of the benefits of
moving information involved the capability for employees to work more flexibly,
don't have that should allow us to collaborate better and work more flexibly
infrastructure as a service, stating, “the benefits are, you get scale, you get flexibility,
you get the ability to dynamically scale up or down your storage requirements based
245
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
on your needs at the time”, continuing, “it's really subscription-based services which
year. This increases the speed by which they can be accessed, which then increases
organisational agility. FinCo1 acknowledged this was a key driver, stating, “the driver
[is] the operational efficiencies and the agility of consuming services.” StatGov2
agreed, stating, “The benefits, number one, is … what you want, … you can get
really fast”. StatGov3 perceived there were other benefits to high speed, stating, “you
also are able to spin-up additional storage at a fairly minimal time delay. That can
present a lot of benefits.” FinCo2 perceived that this speed improved the
and running with those functions a lot quicker. So, time to market, time to
6.3.3.3 Availability
As well as external cloud-based services being available from anywhere in the world,
services are also available for a higher percentage of time. StatGov1 agreed that
benefits include services being available from any country, stating, “availability
anywhere”. ITCo3 saw benefits in having skilled service personnel from the
“You’d outsource it because it’s much easier to get 24/7 operation and
continuous monitoring when it’s outsourced, and you’ve got around the clock
support and follow the sun and everything else than it is do that yourself.”
246
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
outsourcing. FedGov1 stated, “I think it's economies of scale. You should be able to
get something that's better than what we can provide with a bunch of five or six
“So, the only way that this whole market works is if there is a lot of shared
cost and shared infrastructure, and effectively, the best we’ve come up with
out of that is outsourcing. The classic example being email. Anyone at the
moment that is still hosting their own mail server is insane. Just give it to
implausible that you are going to be able do a better job than they are.”
AvCo1 identified that one of the motivations for outsourcing is difficulties with
retaining skilled staff, and outsource vendors with their economies of scale could
“I mean, if you do it more cost effectively, that’s the key thing. … one of the
biggest problems is having skilled staff who understand how to manage those
environments and keeping them trained and everything else to manage those
environments.”
“the benefits are, you get scale, you get flexibility, you get the ability to
needs at the time. And you don't have to go buy a whole bunch of
environments, you don't have to have extensive lead times while you get
247
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
funding, CapEx approval funding, projects established, lead times for the
EduCo2 expanded on a benefit of outsourcing to cloud being cost savings from the
“if you include the capital cost of having to renew your own environment
maintain them yourself, over the course of the life cycle, there is an arguable
FinCo3 noted that accessing outsource vendors with their economies of scale and
think outsourcing can allow you to access service providers that operate at
doing it yourself.”
One of the benefits of using outsource cloud environments is that their maintenance
patching for hardware and operating systems is constantly up to date. This eliminates
the need for organisations to hire employees with necessary skills and patch systems
themselves. StatGov1 used the term ‘evergreen’ to describe the nature of these
cloud will give us that.” FedGov1 identified that aging internal ICT systems was a
248
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
“when I first took over the IT section – we had a lot of issues with our
systems, very unreliable, so there hadn't been investment in the facilities. So,
“a little company …, and they had a server and never backed up the server.
… If something ever happened to it, they were screwed. But by having that in
the cloud, somebody was maintaining it, somebody was keeping the versions
up to date.”
FinCo4 perceived that outsource vendors having many skilled employees keeping
their systems evergreen meant that the vendors and customers benefited from the
“When it comes to using outsourced services …, some of the benefits are that
AvCo1 identified that a motivator for accessing outsource services was the latent
pool of skilled resources, stating, “one of the biggest problems is having skilled staff
who understand how to manage those environments and keeping them trained … to
manage those environments.” StatGov1 agreed that a gap in internal skillsets meant
don't have that should allow us to collaborate better and work more flexibly
than we currently do. So yeah, I would pay a small premium for that.”
249
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
TelCo1 thought that security skills were in short supply and that using the services of
risk, skill shortage. The cost of skills here is highly significant, cost of labour.”
personnel with the right skills. You go to a consulting firm or an outsourcer really for
“looking at available skills, let's take big data, Hadoop, MongoDB and the
data lakes … You may want to turn to an outsource partner that specialises in
ITCo4 perceived that the benefit of accessing skills externally was that internal staff
“An organisation needs skills in designing and building applications and how
they … manage and handle their data. They don't necessarily need to have
building car widgets, why do they also need to be experts in securing their
business and organisation, but that’s not what they specialise in. That’s
250
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
internally between employees but also externally with other stakeholder groups such
as customers and suppliers. StatGov1 perceived that their employees and their
stating,
don't have that should allow us to collaborate better … than we currently do.”
“we don’t call it outsourcing. We call it team building. What we call it is, we are
Accenture contract is: come on-board, sit with us, and they don’t get separate
lanyards. They are not identified differently. They are part of the team, not just
Given large outsource vendors trade on their reputation, ensuring the security of their
disparity in levels of security, stating, “I'm making an assumption, but I'm almost
certain that Microsoft's environment is gonna be more secure than anything I can do
internally.” PharmaCo1 agreed that an outsource vendor should have better security,
stating,
251
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
“In terms of a cyber risk, assuming you picked a credible outsourcer, you
have essentially a similar risk profile. Often, an outsourcer can do a better job
“Additional security for no extra cost.” StatGov2 agreed and added that often the
customer can dictate the level of security required, stating, “you can … include in the
contract what security you need, and they can provide you with all that.” EduCo2
acknowledged that outsource vendors weren’t perfect, but was certain they had
“more secure environments that the big outsourcers or the big cloud-providers
they run … triple-redundant data centres with full encryption, there’s always
the potential for someone to come up with some innovative new way of
environments to make sure that they are secure because their business
reputation depends on it. The main benefit I would point to, in terms of moving
information to the cloud … is that … they are more secure environments than
Most research participants perceived that use of outsource services was a cheaper
252
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
environments by purchasing cloud services based on how much they used the
environment, not a fixed cost regardless of whether they used it or not. ITCo2
agreed, stating, “I think there can be considerable benefits … [like] lower cost”. ITCo1
noted the lack of capital expense for ICT hardware, stating, “It’s cheaper. You don’t
have to pay for hardware.” PharmaCo1 also perceived that organisations might want
reducing cost, using the services of an external cloud vendor reduced risk, stating,
“reducing the inhouse cost, both in terms of financial and human resources. I
mean, you don’t have to maintain those skills inhouse, and you don’t have to
pay for it. You’re paying someone else to do all that, organise the expertise
EduCo1 agreed with the reduced cost premise, stating, “Lower cost of service,
obviously.” FinCo3 also perceived that accessing external ICT services could reduce
costs, stating,
“I think outsourcing can allow you to access service providers that operate at
Often organisations can reduce ICT workload on internal employees by using the
services, availability anywhere, these are the advantages of the cloud, evergreen
large range of activities that are required to operate internal ICT environments,
stating,
253
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
“It’s a hell of a lot more reliable every time than you doing it yourself. When
something goes wrong, you’ve got it to get it fixed, you’ve got to get someone
in, and you’ve got to find someone who’s got the expertise, which means
you’ve got to have a relationship, whereas with something like Google, it just
works. It works every time. And when it’s got an outage, if Google has a five-
minute outage then it’s world-wide news. When I had an outage, we had a
system and we had internal, and it was two weeks to fix it because we had to
reboot the damn server and everything else, and our email was down for that
period of time.”
Large external outsource facilities often have mature disaster recovery plans and can
cloud will give us that.” FedGov2 had a primary focus on monitoring and detecting
“We have tools that we’ve developed to maintain the integrity of our external
facing websites. If they ever get compromised or defaced, then they get taken
back to a last known good state immediately … And we’re very heavily
ITCo4 also had processes established to restore services quickly if their outsource
“to have data portability so that if something happens inside the outsourced
environment, they can potentially bring that data back into their on-premise
environment, or some other service provider, and get it up and running again
really quickly.”
254
CHAPTER 6: FINDINGS – APPROACH AND IMPACTS
6.3.3.12 Reliability
Since external ICT outsource vendors primarily focus on the availability of their
services to generate revenue, the corollary is they are therefore more reliable. ITCo1
explained, stating,
“So, going with someone like Google just means it's a hell of a lot more
reliable. … and it just works. It works every time, and there’s really no
problems with it. And if there is a problem, they get right on it and you get it
This chapter describes the findings from analysis of the data, providing a rich
description of the concept of information security strategy, analysed for its properties
and dimensions, noting any variations throughout. After the data were analysed,
related analyses were aggregated into categories, which were integrated and then
interpreted in relation to the overall research question. “The quality and contribution
of one’s work depends upon the depth and breadth of the investigation” (Corbin &
Strauss, 2008, pp. 273). Table F.1 in Appendix F summarises the findings from the
255
Chapter 7: Discussion
The substantive theory put forth in this chapter3 is that, based on certain antecedent
conditions, the appropriate selection and use of an information security strategy will
guide the optimal storage and use of information held organisation-wide, leading to
strategies in the proposed theoretical model, the relationships between them and
different strategic impacts on the organisation, and practical advice on how to select
boundary set of assumptions and constraints” (Bacharach, 1989, pp. 496). The
theory is built around a core category, which in this thesis is “approach to securing
information”, but “theory doesn’t just build itself; in the end, it is a construction built by
the analyst from data provided by participants” (Corbin & Strauss, 2008, pp. 266).
findings from the data collected and analysed previously in chapters two, four, five
and six. To reiterate, the intent of this research program is to engage in theory
building, not theory testing which is suggested as a future research direction for the
completed model using statistical studies. Based on the principle of Ockham’s razor,
between simplicity and fecundity of data must be made (Gregor, 2006; Weber, 2012).
Horne, C.A., Maynard, S.B., and Ahmad, A. 2017. "Organisational Information Security
Strategy: Review, Discussion and Future Research," Australasian Journal of Information
Systems (21).
Horne, C.A., Ahmad, A., and Maynard, S.B. 2016. “A Theory on Information Security,” The
27th Australasian Conference on Information Systems, Wollongong, Australia.
256
CHAPTER 7: DISCUSSION
The aim of this chapter is to combine findings from the literature review described in
Chapter 2, with the substantive categories generated from the data collection and
al., 2011; Strauss & Corbin, 1990). It is this relating of concepts together instead of
simply listing them that raises findings to the level of a theory (Corbin & Strauss,
based on combining the core category “approach to securing information” with other
section explains the theoretical model of information security strategy including its
various elements and describes them based on the structural components of a theory
This theory involves the selection of one appropriate information security strategy to
be used towards the achievement of organisational goals. The selected strategy may
selection of usable ICT infrastructure and security controls for the protection of
257
CHAPTER 7: DISCUSSION
according to its strategic value, with non-valuable information still being protected but
more comprehensive and expensive controls to protect it, which may be sourced
externally.
There are five types of theory which include 1. analysis, 2. explanation, 3. prediction,
4. both explanation and prediction, and finally 5. design and action (Gregor, 2006).
fourth category, for explanation and prediction. An explanation and prediction type of
theory describes “what is, how, why, when, where, and what will be” (Gregor, 2006,
pp. 620). Contributions to knowledge embodying this type of theory typically offer
7.4 Assumptions
to reduce any inferential errors that may result from using biased formative
agreed upon prior to the utility of any proposed theoretical model being established.
Failure to take assumptions into account threatens the validity of any resultant
include the ownership of trade secrets, obligations under regulatory compliance, and
258
CHAPTER 7: DISCUSSION
organisation choosing the least cost alternative. Given two competing alternatives for
security controls that would achieve the same level of security to protect information,
guiding principle that affects all procurement decisions for security controls.
Many researchers have formed a position on what a theory is and is not, and what
the structural components of a theory are (Bacharach, 1989; Gregor, 2006; Grover,
Lyytinen, Srinivasan, & Tan, 2008; Weber, 2012). Often researchers will describe the
falsified (Weber, 2012). Given this theoretical model of information security strategy
is designed for practitioners, this paper adopts the structural components of theory
259
CHAPTER 7: DISCUSSION
One component of a theory that is required is a depiction of the theory in some way,
such as a diagram, table, picture, narrative, or model (Gregor, 2006). In this thesis,
2006). Figure 7.1 offers a visual depiction of the four generic strategies included in
critical in the case of trade secrets. Organisational Context is also a category code
indicating dimensions using an ordinal scale, that refers to external factors that might
260
CHAPTER 7: DISCUSSION
The phenomena of interest relate to the concepts identified during the open coding
and reassembling of data about the approaches taken to securing information and
Minimisation. The construct names are in-vivo codes adapted from statements made
by research subjects during their data collection interviews and were subsequently
employed during model formation (see Table 7.1). They map to the four main
concepts discovered during data analysis that describe the ways that organisations
7.7.1 Fortification
outsourcing may include the irreplaceability of trade secrets, which should be termed
strategic information due to its utility in the pursuit of organisational goals. The
controls to mitigate the risk of a security incident and typically cannot outsource its
261
CHAPTER 7: DISCUSSION
management. The higher the information’s value, the greater the need for
comes with an associated expense burden, both in financial terms and human
capital.
7.7.2 Devaluation
The Devaluation strategy intends to increase security by lowering the value of the
information held, either by (1) avoiding holding valuable information in the first place,
valuable information, the organisation becomes more secure against threats because
there is less impact on operations from security incidents. Organisations also avoid
the expense associated with the protection of valuable information. This is a novel,
where retail shops put an empty cash register till in their front windows overnight
along with a note stating, “No Cash Held on Premises”. This causes the shop to be
more secure and the reason is the deterrent effect, where attackers may read the
note through the window, then decide to pass the shop by and not force entry. This is
due to a perceived imbalance of required effort versus potential gain, where the
attacker may perceive that too little will be gained from too much effort. An interesting
implication in this example is that there is a feedback loop to the attacker (i.e. the
note in the window) to let the attacker know that there is nothing worth stealing,
without which this technique may not work. The threat emanates from a human
262
CHAPTER 7: DISCUSSION
This differs for example from a bushfire, where the threat has no decision-making
capability. Combining emptying the till with the message helps cause the deterrent
effect, rather than simply emptying the cash register alone. It cannot be said to be
true in all cases however, as the attacker might assign value to other items in the
retail shop, so from a causality perspective, this deterrent can be said to reduce the
likelihood of an attack due to the perceived lack of financial reward. By devaluing the
information held, organisations can reduce the impact from a security breach.
7.7.3 Outsourcing
infrastructure and security controls from external vendors. Benefits include gaining
access to more highly skilled or qualified staff, an external provider’s larger security
budget, and providing latent capacity and scalability. Outsourcing ICT infrastructure
can take the form of secure and resilient ICT infrastructure, managed by a third party,
with scalable security controls. A robust business continuity plan with cyber
outsourcing services often have the advantage of scale and scope. Outsourcing
comes with a loss of control however, and therefore, a possible increase in risk.
There are several barriers to outsourcing (e.g. regulatory compliance, external threat
Benefits that may be obtained include gaining access to highly skilled or qualified
staff, external provider’s larger security budgets, and providing latent capacity and
scalability. Outsourcing ICT infrastructure can take the form of secure and resilient
dedicated ICT infrastructure, managed by a third party, with scalable security controls
held securely by outsourcing its management because vendors that offer outsourcing
263
CHAPTER 7: DISCUSSION
services have an advantage of scale and scope. A metaphor might be people who
keep cash under their mattresses beginning to believe that banks can keep their
Outsourcing comes with a loss of control however. For example, public cloud
vendors that offer the use of shared computing resources have data centres that are
typically located all over the world. Information stored in a data centre in one country
support staff who work on the cloud infrastructure originate from many nationalities.
Public cloud vendors often co-locate their computing and networking infrastructure in
data centres that are owned by other companies and employ contractor support staff.
Any one of these staff or organisations could pose a threat and they should all be
industrial, political and legal factors, external threat environment and the existence of
valuable information (Baets, 1992; Banker et al., 2010; Baskerville, 2010; Beebe &
Rao, 2009; Kayworth & Whitten, 2010; Kelly, 1999; Kim et al., 2012; Posthumus &
Von Solms, 2004; Tutton, 2010). Any of these constraints may preclude the use of
outsourcing.
7.7.4 Minimisation
The Minimisation strategic goal is to provide the minimum viable security for non-
negligent in the event of a security breach. It provides a plausible defence for those
264
CHAPTER 7: DISCUSSION
owners that insufficient protection was provided for the non-valuable information. It
may take the form of hosting on cheap and efficient external public cloud and takes
advantage of the security controls put in place by vendors with large security budgets
Generic constructs have relationships amongst them that are labelled associative,
OrgISS explained in the following passages includes causal relationships, not simply
where a change in one factor increases the likelihood of something else being
affected and is best suited to the social sciences because of the open system of
environmental conditions in an organisation that could affect the relationships, not all
described in this theory are not explained using operators of first-order predicate
In analysing the findings from data analysis, the properties of information and the
way it is used, combined with organisational contextual conditions, both influence the
on categories, only the concepts that affect outcomes are depicted in Figure 7.2.
Appendix G provides a summary of all the coding, moving from open concepts to
axial categories, depicted as a data structure, with format adapted from Gioia et al.
(2013). Integration of selective coding allowed for the focus of the model to be on
core concepts and only the relationships that demonstrably affect the selection of an
information approach (Glaser & Strauss, 1967; Wiesche et al., 2017). For example,
265
CHAPTER 7: DISCUSSION
within the Information category, there were seven concepts and properties
discovered from the data (i.e. asset, value, control, access to functionality,
functionality appear in the final model, due to the existence of data that supported
depicted are uni-directional, real life is complex and after theory testing, some may
See Table F.2 in Appendix F for a summary of concept descriptions and evidence of
7.9 Scope
The scope of the theory on information security strategy in this thesis is a substantive
strategy and can be applied under varying conditions (Glaser & Strauss, 1967;
266
CHAPTER 7: DISCUSSION
Urquhart et al., 2010). It is defined by the generalisability of the modal qualifiers used
to describe the relationships between constructs (like all or some) and clarifications
about boundaries (Gregor, 2006). In terms of statements that define scope, all
The boundaries of this theoretical model of information security strategy include all
information and the people who work on the infrastructure and information. Protection
eventual integration to explain causality (Corbin & Strauss, 2008). This section gives
interest. Causality can be explained in varying ways and the following list, with four
267
CHAPTER 7: DISCUSSION
Use of the terms explanation or causal explanation in this paper refers to the third
type of causality, termed causal analysis, which is more suited to the social sciences
which lack the properties of a closed system such as identifying all variables and
information and contextual conditions categories, with different concepts from the
In this section, the seven concepts related to the core category Information are
examined for not only their properties and dimensions, but the way that they
evidenced by the business strategy in their strategic plan. For the sake of edification,
the term business is used here for a public organisation as well, using the
to citizens. Business goals are influenced by the vision and mission of the
organisation, as well as any resources the organisation owns. The goals of the
organisation are achieved through using resources which can include information
assets. These information assets can take the form of trade secrets, intellectual
property, or a customer database for example. The goal of these information assets
Organisations must then consider whether the goals for the use of information can be
268
CHAPTER 7: DISCUSSION
between the organisation and a customer. An organisation may gain surety about the
efficiency of this transaction by holding the credit card details, by using an outsource
supplier to hold the credit card details, or by not holding the details and accessing an
external service such as PayPal to gain access to credit card details on demand. The
functionality that the organisation desires is the use of the credit card details on
the financial transaction without accessing the credit cards on demand is to ask the
customer to present their credit card during each purchase transaction. In this
scenario, no credit card details are held by the organisation, an outsource supplier, or
a specialist service provider such as PayPal, because the customer continues to hold
(and secure) the credit card details. The customer may then decide to not present
their credit card and the organisation must decide whether this risk is worth taking. In
achieved without the organisation securing access to the functionality of the credit
Often, achieving the information goal without safeguarding access to the functionality
must have an owner identified, as this person will be responsible for the lifecycle
management of the information, i.e. its creation, protection, use, and eventual
destruction (Tallon & Scannell, 2007). Decisions made about whether management
and control of information can be shared with an outsourcing provider must be made
affect the location of the information, as the outsourcer may be required to hold and
secure the information externally so that it can use the information to provide a
service or benefit back to the organisation. The organisation must be able to trust
269
CHAPTER 7: DISCUSSION
that the outsource provider can manage the lifecycle of information as well or better
than the organisation, and if it cannot, then it must retain management of the
will probably not be able to engage in outsourcing. There are also a range of
enablers that can positively affect the decision to engage in outsourcing. A decision
from it. From the earlier example, PayPal owns and stores credit card details and
organisations can pay a small fee to access this service and achieve informational
disclosed during a security breach. Reducing the impact of security breaches results
although testing is outside the scope of this thesis. They form the basis of
270
CHAPTER 7: DISCUSSION
will be higher.
be higher.
exist, and the organisation stores information externally, then the perceived
practice, specifying the steps by which practitioners can assess the varying nature of
information security strategy (Gregor, 2006). The following steps depend on eliciting
the growth path for an organisation over the coming five years. It follows then that
should the business strategy document be rewritten in five years’ time, then the
information security strategy should also be rewritten, to ensure alignment with goals.
271
CHAPTER 7: DISCUSSION
The practical application of this substantive theory requires that it be highly related to
information security, that laymen employees can read and follow the steps, it must be
practitioners partial control over everyday changes in their situation (Glaser &
Strauss, 1967). The prescriptive steps adhere to these four principles and are
The information audit catalogue should contain the name of the information, a
sensitivity, what systems and people have access to the information, what the
information is used for, the information’s classification, its location, and its ownership.
With regards to classification, all information should be profiled and classified, for
example into a classification system such as one that military organisations might
using PUBLIC, CONFIDENTIAL and SECRET is intuitive and easy to understand for
272
CHAPTER 7: DISCUSSION
organisation’s vision and mission. Every initiative in the strategic plan that potentially
include what the goals of the organisation are, what industry it operates in, whether
the organisation owns intellectual property, and what the main resources owned by
The next step is to decide whether any constraining or enabling antecedents exist
and are relevant to the organisation. Constraining and enabling antecedents for
information, people, processes or ICT infrastructure. There are quite a few conditions
that may exist, and Table 7.2 illustrates some of the more common constraints.
273
CHAPTER 7: DISCUSSION
ii. If the organisation does NOT hold strategically valuable information and
iv. If the organisation does NOT hold strategically valuable information and no
274
CHAPTER 7: DISCUSSION
As part of the process, the selected strategy should be approved by the governing
body, for example the board of directors or the minister of a government department,
and then used to guide the development of a strategic plan involving a set of
Grounded theorists have an obligation to relate their developing theory with other
this are twofold, as (1) this contributes to theoretical integration throughout the
information systems discipline, and (2) this increased understanding could support
the development of formal theories (Urquhart et al., 2010). Another benefit is that this
Strauss, 1967, pp. 34). This section improves theoretical boundary clarity because
“any contest between insights and existing theory becomes a comparative analysis
that delimits the boundaries of the existing theory while generating a more general
one” (Glaser & Strauss, 1967, pp. 255). Accordingly, this section relates the theory
The theory of information warfare from Denning (1999) argues that information
resources, which are defined by the author as the ‘containers’ that hold information,
can increase or decrease in value based on warfare activities conducted by either the
organisation or its enemies. Given the persistent nature of advanced threat actors,
information warfare has a lot to offer in guiding the defensive and offensive
previously established theory, the main incompatibility with OrgISS is the naming of
275
CHAPTER 7: DISCUSSION
against threats. Resources can then be reliably used by the organisation towards the
pursuit of its goals and exploited the same as any other asset owned by the
Galbraith (1974). These theories have implications for OrgISS whereby the nature of
explicitly state that although the strategy is instantiated in written form, and its
business strategy renewal as a result of this insight from dynamic capabilities theory.
General systems theory originally described by Von Bertalanffy (1969) holds that
systems in their own right, and when they interact with each other, or with external
organisations, they share information and can evolve and change their properties as
a result. The interconnection of the individual systems links them into an entire
ecosystem. This has implications for OrgISS when assessing outsource partners.
Should an outsourced ICT infrastructure vendor for example use the physical
premises of a data centre provider, then not only does the organisation have to
276
CHAPTER 7: DISCUSSION
assess the security maturity of the outsource partner but any suppliers that it uses as
well to check for vulnerabilities. OrgISS theory has already identified the requirement
participate in organisational activities primarily for their own self-interest and the
priorities of these interests are not immediately obvious. This has implications for the
outsource vendor’s controls are at least, if not better than, the security controls in use
by the organisation. However, security controls cost money and the outsource vendor
covertly reduce security controls to reduce expenses and increase profit, and the
Contingency theory as originally espoused by Fiedler (1964) contends that there are
approaches are dependent on internal and external constraints. This linkage between
internal and external conditions affecting the selection of the most appropriate option
from a small set of options is consistent with the model design adopted by OrgISS.
As a difference however, OrgISS goes further to explain in detail what the benefits
are to an organisation from the optimal option selection. Contingency theory has
been criticised for a lack of explanatory power however OrgISS has been careful to
guide an organisation that does not own valuable information that specifically
277
CHAPTER 7: DISCUSSION
accessing customer credit card details held by PayPal to transact a sale. The
can be explained using resource dependency theory by Pfeffer and Salancik (1978).
In this theory, actors lacking essential resources will seek them from others by
resource-based view of the firm theory by Penrose (1959), which argues that
advantage if they possess four characteristics, being valuable, rare, inimitable, and
competitive advantage.
Findings. Some regulatory bodies, for example the Payment Card Industry Security
Standards Council, enforce an uplift in security controls within organisations that hold
DePietro, Wiarda, and Fleischer (1990). These authors argue that technologies
relevant to the organisation, characteristics of the organisation such as its size, and
278
CHAPTER 7: DISCUSSION
the environmental context such as its industry, affect the process by which an
This chapter combined concepts discovered during a review of the literature with
findings from data collection and analysis, to propose a set of four generic strategies
279
Chapter 8: Conclusion
In this chapter4, I summarise the research program and draw several conclusions
based on the discussion chapter. I revisit the research question and sub-questions
posited in chapter one and answer them. I list and describe the key findings from the
perfect, so I identify key limitations and offer suggestions for future research
directions. The thesis is closed with a list of references and several appendices
which contain data relevant to the study but due to their voluminous nature, would
detract from the narrative if they were included in the body of the thesis.
The aim of this chapter is to draw strong conclusions from the arguments in the
discussion chapter and to respond to the aim of the research as described in the
This thesis offers a theoretical model of information security strategy and advances
information security should assess their organisational information value and their
key factors in their environment before making decisions about selecting one strategy
Horne, C.A., Maynard, S.B., and Ahmad, A. 2017. "Organisational Information Security
Strategy: Review, Discussion and Future Research," Australasian Journal of Information
Systems (21).
280
CHAPTER 8: CONCLUSION
to secure all information. There are four main approaches commonly taken to
increase the security of information. These are (1) to increase protection of valuable
protections are sufficient, (3) to seek external assistance with the protection of
The reason for this is to improve the academic community’s shared knowledge of the
phenomenon and to act as the base for any future research (Zmud, 1998). Therefore,
this section does not seek to summarise conclusions as the previous section has
already achieved this, but rather identify the significance of each of the conclusions.
The following describes the implications of my research model in both theoretical and
theoretical model that might be most appropriate for future empirical testing, and also
some suggestions for what aspects of the model could be developed more with
prescriptive statements and contextual situations where the application of the model
281
CHAPTER 8: CONCLUSION
finding to engage in outsourcing, not to gain access to skillsets or reduce cost, but to
decisions about security have typically been left to executives and management.
technological infrastructure, and cyber insurance, which has been a gap in guidance
to date. The executive staff can identify appropriate strategic initiatives to implement
the approved strategy, request adequate budget, and share responsibility with
The selection of an information security strategy then sets the direction for the
information earmarked for protection. The rest of the information that was
for example linking to PayPal to process credit cards rather than hold card
details internally.
282
CHAPTER 8: CONCLUSION
services from the outsourcing vendor must be both preventative, for example
invest millions of dollars into security for their respective platforms. Procuring
cloud takes advantage of these large security budgets and avoids the cost of
iv. Minimisation: Organisations can find a way to not hold valuable information
yet still achieve their vision and mission. This approach can significantly
goals.
The research question from Chapter 1 guiding the conduct of this research body of
work is:
This research question was broken down into the following sub-questions and an
283
CHAPTER 8: CONCLUSION
organisation.
An organisation should select a single strategy for the entire organisation by following
these rules:
ii. If the organisation does NOT hold strategically valuable information and
iv. If the organisation does NOT hold strategically valuable information and no
The selected strategy should be endorsed by the governing body, for example the
This research made several findings including identifying the antecedents that
284
CHAPTER 8: CONCLUSION
The antecedent conditions were largely grouped into two main areas, with the first
group including concepts that related to a core category, information. The four main
concepts that emerged from the data were accessing the functionality provided by
few other properties of information were also identified which were information
The second group related to the organisation. There are three discrete categories of
outsourcing enablers. These three categories each contain a set of concepts with
their properties and dimensions. Organisational conditions are those factors that
describe the strategic and operational level aspects of an organisation that relate to
information security. They include the organisation’s vision and mission, goals,
have an enormous effect on decisions made both in the director’s boardroom and
8.5.2 Finding 2: A Set of Constituent Concepts That Together Form the Body
During the literature review, a set of concepts were identified that form the
components can be grouped according to the level of an organisation that they relate
285
CHAPTER 8: CONCLUSION
prevention, and policy. At the group level, components included knowledge leakage
infrastructure.
8.5.3 Finding 3: A Set of Concepts That Are Benefits Yielded from The
expenses, regulatory compliance, reducing risk of litigation, and reducing share price
fluctuations.
causes an organisation to increase the volume and type of security controls. Also, an
organisation can maintain partial control over high value information yet increase its
security. As well, information can form the basis of a core competency which
286
CHAPTER 8: CONCLUSION
Organisational concepts such goals and strategy affect how the organisation decides
to store, use and secure its information. As well, constraints such as the existence of
decides to store, use and secure its information. Enablers such as budget or
organisational size can also affect how the organisation decides to store, use and
well, devaluation techniques, such as avoiding holding information in the first place,
ownership of information and to reduce the value of any information held and
This thesis makes several contributions to towards the body of knowledge on why
leaders should take steps to evaluate and select a strategy in practice. Specifically,
287
CHAPTER 8: CONCLUSION
Organisations
The literature review from this research involved thematic analysis which identified a
set of core concepts organised by level and relationship. The levels included
information systems identified several concepts and these were expanded quite
The conceptual model of information security strategy depicts all abstract concepts
and their relationships, generalised from the data. The relationships are proposed
ones only without explanations. This model was then used as a representation of
strategy.
288
CHAPTER 8: CONCLUSION
The theory on information security strategy states that there are four generic
strategies that guide the security of information within organisations. The depiction
along with organisational and environmental conditions, affect selection of the most
Security Strategy
This research provides guidance for practitioners in identifying all structured and
challenges with securing that information, and selecting a strategy to secure it. The
governing body then approves the most appropriate strategy, which can then be
secure information.
8.7 Limitations
data in this research. All research studies are bound by time and resources and this
doctoral thesis is no different. The following are some limitations that apply to the
study.
seeking to adopt an overall strategy for their information security. It demonstrates (1)
the precursor conditions which when met, cause organisations to consider the use of
OrgISS; (2) the constituent elements of an OrgISS for operationalisation; and (3) the
289
CHAPTER 8: CONCLUSION
Given that, there are still have limitations impeding an understanding of OrgISS.
its validity when responding to immediate changes in the external environment. This
gives rise to possible construct validity issues as having a plan is important, but not a
Second, the information systems literature contains analysis on OrgISS from various
stratified perspective has its own properties and varies from an inter-organisational
level, for example in terms of complexity and focus on external factors. Therefore, the
Third, measurement issues arose in this study when I found that information systems
researchers either did not adequately explain the dimensions with which to measure
the elements of the OrgISS construct at each level or defined theoretical measures
for one level and then operationalised them at another (Baskerville & Dhillon, 2008).
Additionally, tangible aspects of OrgISS such as the use of technical controls were
Although this study collected data from 25 research participants from 25 different
other organisations worldwide. However, this study identifies and discusses concepts
290
CHAPTER 8: CONCLUSION
This study utilised deeply subjective questions, and the answers that were given in
response by the participants were also subjective. Although the student researcher
went to some lengths to remain open to findings and bracket biases away from the
study, it is probable that some persist, which is not a bad thing (Corbin & Strauss,
2008).
The research questions and resultant answers often used imprecise measures for
the constructs depicted in the conceptual model. This could not be avoided for the
limited data, and it is hoped that future research might improve measurement.
the model are propositions not hypotheses because formal testing was never within
the scope of this study. This research program focusses on increasing an emerging
strategy but is far from an exhaustive explanation of how OrgISS is applicable to all
organisations. There are a few interesting directions that future research could take
to build on the findings and contributions from this thesis. The following is a list of
Moving away from strategy to look more broadly at the field, this thesis advances
assets, controls and threats. Could this be investigated further with a view to
291
CHAPTER 8: CONCLUSION
Given the strong links from OrgISS to organisational strategic theory apparent in the
literature, what are the links between business strategy, IT strategy, and OrgISS?
How can OrgISS be integrated more fully with business strategy or the IT strategy? Is
operationalisation (Shedden, Ruighaver, & Ahmad, 2010; Tan, Ruighaver, & Ahmad,
2010)? How does OrgISS relate to strategic information systems? What is the role of
the individual level in OrgISS? How do levels of analysis apply in the digital realm?
There are a number of information systems scholars who have researched theories
layering (Ahmad et al., 2014b; Beebe & Rao, 2009; D'Arcy & Herath, 2011). What
would further analysis of other theories reveal about OrgISS? Could another
researcher develop a similar data set, follow the same grounded theory procedures,
and develop the same theory to enhance confirmability? Could the substantive theory
broader than information security and adaptable into other disciplines (Glaser &
Strauss, 1967)?
292
CHAPTER 8: CONCLUSION
How might organisations move from one information security strategy to another?
Could organisations move from Devaluation to Minimisation to further lower the costs
providing minimum viable security via public cloud, to preserve security budget for
higher priority security initiatives? In this case, there may be a loss of control
security budget? Organisations looking for cost savings when protecting valuable
information could look to identify irreplaceable trade secrets and protect them in-
house but outsource all other valuable information and thus leverage the multi-
million-dollar security budgets that large public cloud providers spend on securing
their infrastructure. Outsourcing could then achieve the effects of Fortification but
with reduced expenses, increased scalability and resilience, albeit with increased risk
information exists, and ICT infrastructure and human resources are insourced as per
the Fortification strategy, security controls and hence costs are increased which
results in the valuable information held by the organisation being more secure. By
reduced thus reducing risks, controls and costs. To reduce expenses, Devaluation
would be the preferred option over Fortification, but its selection depends on
293
CHAPTER 8: CONCLUSION
externally stored but secured using the cheapest, enterprise-grade quality, security
controls available.
8.9 Postscript
Although formal testing of this theory on information security strategy is not within the
scope of this thesis, some evaluation of this qualitative research has been performed
independent security review of a business client, which was a very large not-for-profit
eight areas of the client’s technical security controls, evaluate the information security
skills, qualifications and experience of the IT team, and write an evaluation to inform
oriented questions to ask the client, a successful consulting outcome for all
deliverables in a short period, and the work also resulting in some changes being
made to the thesis. Specifically Table 2.3, which offers a thematic map of the
concepts identified during the conduct of the literature review, was changed to
delineate the antecedent concepts more clearly and distinctly, the prescriptive
such as legal, regulatory and standards together to improve efficiency, and future
that would form part of a strategic plan to implement the chosen strategy. Feedback
294
CHAPTER 8: CONCLUSION
from the client was they thought they had been listened to and that the
security strategy was approved by their board of directors at a board meeting three
months later and is currently being used to guide implementation of their information
295
References
296
REFERENCES
Baets, W. (1992). Aligning information systems with business strategy. The Journal
of Strategic Information Systems, 1(4), 205-213.
Banker, R., Chang, H., & Kao, Y.-C. (2010). Evaluating cross-organizational impacts
of information technology – an empirical analysis. European Journal of
Information Systems, 19(2), 153-167.
Barney, J. (2000). Firm resources and sustained competitive advantage. In
Economics Meets Sociology in Strategic Management (pp. 203-227): Emerald
Group Publishing Limited.
Baskerville, R. (2005). Information warfare: A comparative framework for business
information security. Journal of Information System Security, 1(1), 23-50.
Baskerville, R. (2010). Third-degree conflicts: Information warfare. European Journal
of Information Systems, 19(1), 1-4.
Baskerville, R., & Dhillon, G. (2008). Information systems security strategy: A
process view. In D. W. Straub, S. E. Goodman, & R. Baskerville (Eds.),
Information security: Policy, processes, and practices. Advances in
Management Information Systems (pp. 15-45). Armonk, NY: M. E. Sharpe.
Baskerville, R., & Siponen, M. (2002). An information security meta-policy for
emergent organizations. Logistics Information Management, 15(5/6), 337-
346.
Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information
security: Managing a strategic balance between prevention and response.
Information & Management, 51(1), 138-151.
Beebe, N. L., & Rao, V. S. (2009). Examination of organizational information security
strategy: A pilot study. Paper presented at the Americas Conference on
Information Systems, San Francisco, USA.
Beebe, N. L., & Rao, V. S. (2010). Improving organizational information security
strategy via meso-level application of situational crime prevention to the risk
management process. Communications of the Association for Information
Systems, 26(17), 329-358.
Bharadwaj, A., El Sawy, O. A., Pavlou, P. A., & Venkatraman, N. (2013a). Digital
business strategy: Toward a next generation of insights. MIS Quarterly, 37(2),
471-482.
Birks, D. F., Fernandez, W., Levina, N., & Nasirin, S. (2013). Grounded theory
method in information systems research: Its nature, diversity and
opportunities. European Journal of Information Systems, 22(1), 1-8.
Bobbert, Y. (2015). Porters’ Elements for a Business Information Security Strategy.
ISACA, 1.
Bono, J. E., & McNamara, G. (2011). Publishing in AMJ—part 2: Research design.
Academy of Management Journal, 54(4), 657-660.
Booker, R. (2006). Re-engineering enterprise security. Computers & Security, 25(1),
13-17.
Bowdish, R. G. (2013). Military strategy: Theory and concepts. (Doctor of Philosophy
PhD), University of Nebraska, Lincoln, Nebraska. (26)
Bowen, P., Hash, J., & Wilson, M. (2006). SP 800-100. Information Security
Handbook: A Guide for Managers.
Brotby, W., Bayuk, J., & Coleman, C. (2006). Information security governance:
Guidance for boards of directors and executive management: Illinois, IT
Governance Institute.
Burnburg, M. K. (2003). A proposed framework for business information security
based on the concept of defense-in-depth. (Master's Thesis), University of
Illinois, Springfield.
Burrell, G., & Morgan, G. (1979). Sociological paradigms and organisational analysis
(Vol. 248). London: Heinemann.
297
REFERENCES
Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of
publicly announced information security breaches: Empirical evidence from
the stock market. Journal of Computer Security, 11(3), 431-448.
Carcary, M., Renaud, K., McLaughlin, S., & O'Brien, C. (2016). A Framework for
Information Security Governance and Management. IT Professional, 18(2),
22-30.
Catteddu, D. (2010). Cloud Computing: benefits, risks and recommendations for
information security. In Web Application Security (pp. 17-17): Springer.
Cavusoglu, H., Cavusoglu, H., & Raghunathan, S. (2004). Economics of IT security
management: Four improvements to current security practices.
Communications of the Association for Information Systems, 14(1), 37.
Cegielski, C. G., Bourrie, D. M., & Hazen, B. T. (2013). Evaluating adoption of
emerging IT for corporate IT strategy: Developing a model using a qualitative
method. Information systems management, 30(3), 235-249.
Charmaz, K. (2008). Constructionism and the grounded theory method. In J. A.
Holstein & J. F. Gubrium (Eds.), Handbook of constructionist research (pp.
397-412). New York: The Guilford Press.
Cline, M., & Jensen, B. (2004). Information security: An organizational change
perspective. Paper presented at the 10th Americas Conference on
Information Systems, New York, NY, USA.
Colaizzi, P. F. (1978). Psychological research as the phenomenologist views it. In R.
S. Valle & K. M (Eds.), Existential-phenomenological alternatives for
psychology (pp. 48-71). New York: Oxford University Press.
Corbin, J., & Strauss, A. (2008). Basics of qualitative research: Techniques and
procedures for developing grounded theory (3rd ed.). Thousand Oaks, CA:
Sage Publications Inc.
Corley, K. G., & Gioia, D. A. (2004). Identity ambiguity and change in the wake of a
corporate spin-off. Administrative science quarterly, 49(2), 173-208.
Craver, C. F. (2002). Structures of Scientific Theories. In P. Machamer & M.
Silberstein (Eds.), The Blackwell guide to the philosophy of science (1st ed.,
Vol. 7, pp. 55-79). Oxford, UK: Blackwell Publishers Ltd.
Creswell, J. W. (1998). Qualitative inquiry and research design: Choosing among five
traditions. Thousand Oaks, CA: SAGE Publications.
Creswell, J. W. (2003). Research design: Qualitative, quantitative and mixed
methods approaches (2nd ed. Vol. 2). London: SAGE Publications.
Cronbach, L. J., & Meehl, P. E. (1955). Construct validity in psychological tests.
Psychological bulletin, 52(4), 281.
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville,
R. (2013). Future directions for behavioral information security research.
Computers & Security, 32, 90-101.
Crotty, M. (1998). The foundations of social research: Meaning and perspective in
the research process. Sydney, Australia: Allen & Unwin.
D'Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS
security literature: Making sense of the disparate findings. European Journal
of Information Systems, 20(6), 643-658.
Da Veiga, A. (2015). The influence of information security policies on information
security culture: Illustrated through a case study. Paper presented at the
Ninth International Symposium on Human Aspects of Information Security &
Assurance, Lesvos, Greece.
Da Veiga, A. (2016). Comparing the information security culture of employees who
had read the information security policy and those who had not: Illustrated
through an empirical study. Information & Computer Security, 24(2), 139-151.
Da Veiga, A., & Eloff, J. H. P. (2007). An information security governance framework.
Information systems management, 24(4), 361-372.
298
REFERENCES
Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for
information security culture. Computers & Security, 29(2), 196-207.
Da Veiga, A., & Martins, N. (2015). Improving the information security culture through
monitoring and implementation actions illustrated through a case study.
Computers & Security, 49, 162-176.
Daneva, M. (2006). Applying real options thinking to information security in
networked organizations (1381-3625). Retrieved from Enschede, NL:
Datta, P., & Chatterjee, S. (2008). The economics and psychology of consumer trust
in intermediaries in electronic markets: The EM-Trust Framework. European
Journal of Information Systems, 17(1), 12-28.
Dawson, G. S., Watson, R. T., & Boudreau, M.-C. (2010). Information asymmetry in
information systems consulting: Toward a theory of relationship constraints.
Journal of management information systems, 27(3), 143-178.
Denning, D. E. (1999). Information warfare and security (8th ed.). MA, USA: ACM
Press Books.
DePietro, R., Wiarda, E., & Fleischer, M. (1990). The context for change:
Organization, technology and environment. In L. G. Tornatzky & M. Fleischer
(Eds.), The processes of technological innovation (pp. 151-175). Lexington,
MA: Lexington Books.
Dhillon, G. (2018). Principles of Information Systems Security. In B. L. Golub (Ed.),
(pp. 1-559).
Dhillon, G., & Backhouse, J. (2000). Technical opinion: Information system security
management in the new millennium. Communications of the ACM, 43(7), 125-
128.
Dhillon, G., Torkzadeh, G., & Chang, J. (2018). Strategic planning for IS security:
Designing objectives. Paper presented at the International Conference on
Design Science Research in Information Systems and Technology, Chennai,
India.
Doherty, N. F., & Fulford, H. (2006). Aligning the information security policy with the
strategic information systems plan. Computers & Security, 25(1), 55-63.
Donaldson, T., & Preston, L. E. (1995). The stakeholder theory of the corporation:
Concepts, evidence, and implications. Academy of management review,
20(1), 65-91.
Drnevich, P. L., & Croson, D. C. (2013). Information technology and business-level
strategy: Toward an integrated theoretical perspective. MIS Quarterly, 37(2),
483-509.
Drucker, P. F. (1958). Business objectives and survival needs: Notes on a discipline
of business enterprise. the Journal of Business, 31(2), 81-90.
Dulipovici, A., & Baskerville, R. (2007). Conflicts between privacy and property: The
discourse in personal and organizational knowledge. The Journal of Strategic
Information Systems, 16(2), 187-213.
Dutta, A., & McCrohan, K. (2002). Management's role in information security in a
cyber economy. California Management Review, 45(1), 67-87.
Dutta, S. (1996). Linking IT and business strategy: The role and responsibility of
senior management. European Management Journal, 14(3), 255-268.
Evans, D., Gruba, P., & Zobel, J. (2011). How to write a better thesis: Melbourne
Univ. Publishing.
Ezingeard, J.-N., McFadzean, E., & Birchall, D. (2005). A Model of Information
Assurance Benefits. Information systems management, 22(2), 20-29.
Feng, N., Feng, H., Zhang, J., Chen, Y., & Li, M. (2018). Outsourcing Information
Security: The Role of Information Leakage in Outsourcing Decisions. Paper
presented at the International Conference on Information Resources
Management (CONF-IRM), Ningbo, China.
Fibikova, L., & Mueller, R. (2012). Threats, risks and the derived information security
strategy. Paper presented at the ISSE 2012 Securing Electronic Business
299
REFERENCES
300
REFERENCES
Hinde, S. (2002). Security surveys spring crop. Computers & Security, 21(4), 310-
321.
Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and Organizations:
Software of the Mind (Third ed.). New York: McGraw-Hill Education.
Hong, K.-S., Chi, Y.-P., Chao, L., & Tang, J.-H. (2003). An integrated system theory
of information security management. Information Management & Computer
Security, 11(5), 243-248.
Hou, Y., Gao, P., & Nicholson, B. (2018). Understanding organisational responses to
regulative pressures in information security management: The case of a
Chinese hospital. Technological Forecasting and Social Change, 126, 64-75.
Hovav, A., & D'Arcy, J. (2003). The Impact of Denial‐of‐Service Attack
Announcements on the Market Value of Firms. Risk Management and
Insurance Review, 6(2), 97-121.
Hu, Q., Hart, P., & Cooke, D. (2007). The role of external and internal influences on
information systems security – a neo-institutional perspective. The Journal of
Strategic Information Systems, 16(2), 153-172.
Hua, J., & Bapna, S. (2013b). Who can we trust? The economic impact of insider
threats. Journal of Global Information Technology Management, 16(4), 47-67.
Huang, C. D., Hu, Q., & Behara, R. S. (2008). An economic analysis of the optimal
information security investment in the case of a risk-averse firm. International
Journal of Production Economics, 114(2), 793-804.
Husserl, E. (1931). Ideas: General Introduction to Pure Phenomenology (W. Ralph &
B. Gibson Eds.). London: Allen & Unwin Limited.
ISO/IEC. (2013). ISO/IEC 27014:2013 Information technology — Security techniques
— Governance of information security. In. Geneva, Switzerland: ISO/IEC.
ISO/IEC. (2018). ISO/IEC 27000:2018(E) Information technology — Security
techniques — Information security management systems — Overview and
vocabulary. In. Geneva, Switzerland: International Organization for
Standardization and International Electrotechnical Commission.
Johnson, M. E., & Goetz, E. (2007). Embedding information security into the
organization. IEEE Security & Privacy, 5(3), 16-24.
Kankanhalli, A., Teo, H.-H., Tan, B. C., & Wei, K.-K. (2003). An integrative study of
information systems security effectiveness. International journal of information
management, 23(2), 139-154.
Karyda, M. (2017). Fostering Information Security Culture In Organizations: A
Research Agenda. Paper presented at the The 11th Mediterranean
Conference on Information Systems, Genoa, Italy.
Kayworth, T., & Whitten, D. (2010). Effective information security requires a balance
of social and technology factors. MIS Quarterly Executive, 9(3), 163-175.
Kelly, B. J. (1999). Preserve, protect, and defend. The Journal of Business Strategy,
20(5), 22-25.
Kim, S. H., Wang, Q.-H., & Ullrich, J. B. (2012). A comparative study of cyberattacks.
Communications of the ACM, 55(3), 66-73.
Kinnunen, H., & Siponen, M. (2018). Developing Organization-Specific Information
Security Policies. Paper presented at the Pacific Asia Conference on
Information Systems, Yokoyama, Japan.
Kotulic, A. G., & Clark, J. G. (2004). Why there aren’t more information security
research studies. Information & Management, 41(5), 597-607.
Larsen, K. R., & Eargle, D. (2018). Theories Used in IS Research Wiki. Retrieved
from http://IS.TheorizeIt.org
Layton, T. P. (2016). Information Security: Design, implementation, measurement,
and compliance. Boca Raton, US: Auerbach Publications.
Lee, A. S., & Baskerville, R. (2003). Generalizing generalizability in information
systems research. Information systems research, 14(3), 221-243.
301
REFERENCES
302
REFERENCES
303
REFERENCES
Roberts, N., Galluch, P. S., Dinger, M., & Grover, V. (2012). Absorptive capacity and
information systems research: Review, synthesis, and directions for future
research. MIS Quarterly, 36(2), 625-648.
Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organisational security
culture: Extending the end-user perspective. Computers & Security, 26(1), 56-
62.
Ryan, J. J., & Ryan, D. J. (2006). Expected benefits of information security
investments. Computers & Security, 25(8), 579-588.
Sandberg, J., & Alvesson, M. (2011). Ways of constructing research questions: Gap-
spotting or problematization? Organization, 18(1), 23-44.
Schneier, B. (2003). Beyond fear: Thinking sensibly about security in an uncertain
world (1 ed.). New York: Copernicus Book.
Shanks, G., Arnott, D., & Rouse, A. (1993). A review of approaches to research and
scholarship in information systems: Department of Information Systems,
Faculty of Computing and Information Technology, Monash University.
Shedden, P., Ahmad, A., Smith, W., Tscherning, H., & Scheepers, R. (2016). Asset
identification in information security risk assessment: A business practice
approach. Communications of the Association for Information Systems,
39(15), 297-320.
Shedden, P., Ruighaver, T., & Ahmad, A. (2010). Risk Management Standards – The
Perception of Ease of Use. Journal of Information Systems Security, 6(3), 23-
41.
Sikolia, D., Biros, D., Mason, M., & Weiser, M. (2013). Trustworthiness of grounded
theory methodology research in information systems. Paper presented at the
Eighth Midwest Association for Information Systems Conference (MWAIS),
Normal, Illinois.
Siponen, M., & Baskerville, R. (2018). Intervention effect rates as a path to research
relevance: Information systems security example. Journal of the Association
for Information Systems, 19(4), 247-265.
Siponen, M., & Tsohou, A. (2018). Demystifying the influential IS legends of
positivism. Journal of the Association for Information Systems, 19(7), 600-
617.
Siponen, M. T., & Oinas-Kukkonen, H. (2007). A review of information security issues
and respective research contributions. ACM Sigmis Database, 38(1), 60-80.
Straub, D. (2012). Editor's comments: Does MIS have native theories? MIS
Quarterly, 36(2), iii-xii.
Straub, D., Boudreau, M.-C., & Gefen, D. (2004). Validation guidelines for IS
positivist research. The Communications of the Association for Information
Systems, 13(1), 63.
Strauss, A., & Corbin, J. (1990). Basics of qualitative research: Grounded theory
procedures and techniques (1st ed. Vol. 15). Thousand Oaks, CA, US: Sage
Publications, Inc.
Strauss, A., & Corbin, J. (1994). Grounded theory methodology: An overview. In K.
Denzin & Y. Lincoln (Eds.), Handbook of qualitative research (pp. 273-285).
Thousand Oaks: Sage.
Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Procedures and
techniques for developing grounded theory (2nd ed.). Thousand Oaks, CA:
Sage Publishing Ltd. .
Sveen, F., Torres, J., & Sarriegi, J. (2009). Blind information security strategy.
International Journal of Critical Infrastructure Protection, 2(3), 95-109.
Szabó, Z. (2017). The Information Security and IT Security Questions of Pension
Payment. Key Engineering Materials, 755, 322-327.
Tallon, P. P., & Scannell, R. (2007). Information life cycle management.
Communications of the ACM, 50(11), 65-69.
304
REFERENCES
Tan, T., Ruighaver, A. B., & Ahmad, A. (2010). Information security governance:
When compliance becomes more important than security. Paper presented at
the The IFIP TC-11 24th International Information Security Conference,
Brisbane, Australia.
Tarafdar, M., & Davison, R. (2017). Research in information systems: Intra-
disciplinary and inter-disciplinary approaches. Journal of the Association for
Information Systems, 19(6).
Taylor, R. G., & Robinson, S. L. (2014). The roles of positive and negative exemplars
in information security strategy. Academy of Information and Management
Sciences Journal, 17(2), 57-79.
Teece, D. J. (2000). Strategies for managing knowledge assets: The role of firm
structure and industrial context. Long range planning, 33(1), 35-54.
Teece, D. J., Pisano, G., & Shuen, A. (1997). Dynamic capabilities and strategic
management. Strategic management journal, 18(7), 509-533.
Thornberg, R. (2012). Informed grounded theory. Scandinavian Journal of
Educational Research, 56(3), 243-259.
Trauth, E. M., & Jessup, L. M. (2000). Understanding computer-mediated
discussions: Positivist and interpretive analyses of group support system use.
MIS Quarterly, 24(1), 43-79.
Tsang, E. W., & Williams, J. N. (2012). Generalization and induction: Misconceptions,
clarifications, and a classification of induction. MIS Quarterly, 36(3), 729-748.
Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2015). Managing the
introduction of information security awareness programmes in organisations.
European Journal of Information Systems, 24(1), 38-58.
Tu, C. Z., Yuan, Y., Archer, N., & Connelly, C. E. (2018). Strategic value alignment
for information security management: A critical success factor analysis.
Information & Computer Security, 26(2), 150-170.
Tu, Z., & Yuan, Y. (2014, 7-9 August). Critical success factors analysis on effective
information security management: A literature review. Paper presented at the
Twentieth Americas Conference on Information Systems (AMCIS 2014),
Savannah, GA, United States.
Tutton, J. (2010). Incident response and compliance: A case study of the recent
attacks. Information Security Technical Report, 15(4), 145-149.
Urquhart, C., & Fernandez, W. (2013). Using grounded theory method in information
systems: The researcher as blank slate and other myths. Journal of
Information Technology, 28(3), 224-236.
Urquhart, C., Lehmann, H., & Myers, M. D. (2010). Putting the ‘theory’ back into
grounded theory: Guidelines for grounded theory studies in information
systems. Information systems journal, 20(4), 357-381.
Van Der Haar, H., & Von Solms, R. (2003). A model for deriving information security
control attribute profiles. Computers & Security, 22(3), 233-244.
Van Niekerk, J. F., & Von Solms, R. (2010). Information security culture: A
management perspective. Computers & Security, 29(4), 476-486.
Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017).
Risk perceptions of cyber-security and precautionary behaviour. Computers in
Human Behavior, 75, 547-559.
VanScoy, A., & Evenstad, S. B. (2015). Interpretative phenomenological analysis for
LIS research. Journal of Documentation, 71(2), 338-357.
Von Bertalanffy, L. (1969). General systems theory and psychiatry—an overview.
General systems theory and psychiatry, 32(4), 33-46.
VonSolms, B. (2001). Corporate governance and information security. Computers &
Security, 20(3), 215-218.
VonSolms, B., & Von Solms, R. (2004). The 10 deadly sins of information security
management. Computers & Security, 23(5), 371-376.
305
REFERENCES
VonSolms, R., & Van Niekerk, J. (2013). From information security to cyber security.
Computers & Security, 38, 97-102.
VonSolms, S., & Van Heerden, R. (2015). The consequences of Edward Snowden
NSA related information disclosures. Paper presented at the ICCWS 2015-
The Proceedings of the 10th International Conference on Cyber Warfare and
Security: ICCWS2015.
Vroom, C., & Von Solms, R. (2004). Towards information security behavioural
compliance. Computers & Security, 23(3), 191-198.
Webb, J., Ahmad, A., Maynard, S. B., & Shanks, G. (2014). A situation awareness
model for information security risk management. Computers & Security, 44, 1-
15.
Webb, J., Ahmad, A., Maynard, S. B., & Shanks, G. (2016). Foundations for an
intelligence-driven information security risk-management system. Journal of
Information Technology, Theory and Application, 17(3), 25-51.
Weber, R. (2003). Editor's comments: The problem of the problem. MIS Quarterly,
27(1), iii-xii.
Weber, R. (2012). Evaluating and Developing Theories in the Information Systems
Discipline. Journal of the Association for Information Systems, 13(1), 1-30.
Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future:
Writing a literature review. MIS Quarterly, 26(2), xiii-xxiii.
Whitman, M. E., & Mattord, H. J. (2011). Principles of information security (4th ed.).
Boston, MA: Cengage Learning.
Wiesche, M., Jurisch, M. C., Yetton, P., & Krcmar, H. (2017). Grounded Theory
Methodology in Information Systems Research. MIS Quarterly, 41(3), 685-
701.
Williams, J. N., & Tsang, E. W. (2015). Classifying generalization: Paradigm war or
abuse of terminology? Journal of Information Technology, 30(1), 18-29.
Wu, S., & Guo, D. (2016). Research into information security strategy practices for
commercial banks in Taiwan. Paper presented at the International
Conference on Intelligent and Interactive Systems and Applications,
Shanghai, China.
Yin, R. K. (2011). Qualitative research from start to finish. New York: Guilford
Publications.
Yin, R. K. (2013). Case study research: Design and methods: SAGE Publications.
Zmud, R. (1998). "Pure" theory manuscripts. MIS Quarterly, 22(2), xxix-xxxii.
Zmud, R., Robey, D., Watson, R., Zigurs, I., Wei, K., Myers, M., . . . Lee, A. (2001).
Research in information systems: What we haven't learned. MIS Quarterly,
25(4), v-xv.
306
Appendix A: Core Papers Analysed for Literature
Review
Ahmad, A., Bosua, R., & Scheepers, R. (2014). Protecting organizational competitive
advantage: A knowledge leakage perspective. Computers & Security, 42, 27-
39.
Ahmad, A., Maynard, S. B., & Park, S. (2014). Information security strategies:
Towards an organizational multi-strategy perspective. Journal of Intelligent
Manufacturing, 25(2), 357-370.
Anderson, E. E., & Choobineh, J. (2008). Enterprise information security strategies.
Computers & Security, 27(1), 22-29.
Backhouse, J., & Dhillon, G. (1996). Structures of responsibility and security of
information systems. European Journal of Information Systems, 5(1), 2-9.
Baets, W. (1992). Aligning information systems with business strategy. The Journal
of Strategic Information Systems, 1(4), 205-213.
Banker, R., Chang, H., & Kao, Y.-C. (2010). Evaluating cross-organizational impacts
of information technology – an empirical analysis. European Journal of
Information Systems, 19(2), 153-167.
Baskerville, R. (2010). Third-degree conflicts: Information warfare. European Journal
of Information Systems, 19(1), 1-4.
Baskerville, R., & Dhillon, G. (2008). Information systems security strategy: A
process view. In D. W. Straub, S. E. Goodman, & R. Baskerville (Eds.),
Information security: Policy, processes, and practices. Advances in
Management Information Systems (pp. 15-45). Armonk, NY: M. E. Sharpe.
Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information
security: Managing a strategic balance between prevention and response.
Information & Management, 51(1), 138-151.
Beebe, N. L., & Rao, V. S. (2009). Examination of organizational information security
strategy: A pilot study. Paper presented at the AMCIS 2009 Proceedings, San
Francisco, USA.
Beebe, N. L., & Rao, V. S. (2010). Improving organizational information security
strategy via meso-level application of situational crime prevention to the risk
management process. Communications of the Association for Information
Systems, 26(17), 329-358.
Booker, R. (2006). Re-engineering enterprise security. Computers & Security, 25(1),
13-17.
Bowen, P., Hash, J., & Wilson, M. (2006). SP 800-100. Information Security
Handbook: A Guide for Managers.
Brotby, W., Bayuk, J., & Coleman, C. (2006). Information security governance:
Guidance for boards of directors and executive management: Illinois, IT
Governance Institute.
307
APPENDIX A: CORE PAPERS ANALYSED FOR LITERATURE REVIEW
308
APPENDIX A: CORE PAPERS ANALYSED FOR LITERATURE REVIEW
309
Appendix B: Theoretical Background List
The following is a list of 34 theories in information systems, which relate to information security strategy based on the keywords asset, resource,
threat, control, information, security, or strategy, that were found during a search and review of 104 extant information systems theories listed on a
310
APPENDIX B: THEORETICAL BACKGROUND LIST
311
APPENDIX B: THEORETICAL BACKGROUND LIST
312
APPENDIX B: THEORETICAL BACKGROUND LIST
313
APPENDIX B: THEORETICAL BACKGROUND LIST
314
APPENDIX B: THEORETICAL BACKGROUND LIST
315
APPENDIX B: THEORETICAL BACKGROUND LIST
316
APPENDIX B: THEORETICAL BACKGROUND LIST
317
APPENDIX B: THEORETICAL BACKGROUND LIST
318
APPENDIX B: THEORETICAL BACKGROUND LIST
319
APPENDIX B: THEORETICAL BACKGROUND LIST
320
APPENDIX B: THEORETICAL BACKGROUND LIST
321
Appendix C: Ethics Approval
322
Appendix D: Interview Protocol
323
APPENDIX D: INTERVIEW PROTOCOL
324
APPENDIX D: INTERVIEW PROTOCOL
325
Appendix E: Example Transcript from an Interview
326
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Interviewee: 60,000.
Interviewee: Resources.
Interviewee: Correct, that’s part of our cyber intelligence program that looks
at external platforms where the company’s material is –
essentially, the goal is to look for leaked information more than
anything else.
Then there are other areas like public forums, yes, but not
storage. As in chat forums, support forums, and others where
people might upload information, but not private storages.
327
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Interviewee: Yes.
Craig: If so, what are the labels in your classification rating system?
Interviewee: Yes.
328
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Craig: And the board’s job is to interrogate you about what you see is
the risk?
It’s more around what do I want to tell them is more the tone,
and then, they have specific questions around are we ready for
these types of things, or we’re hearing this, or we hear about
this big thing, like WannaCry as an example that caused a lot
of – and we give quarterly updates, so there’s not a lot of gaps
there.
Interviewee: The types of controls being deployed varies by the nature. For
example, if it is digital, my remit is predominantly only for digital
data, not hard copies, physical data, so the levels of controls,
whether we want to do encryption, whether it’s stored in a
certain place, we have repositories that are allowed,
specifically based on classification.
Interviewee: Yes. The controls around the storage and the infrastructure
and the monitoring levels varies on the nature of the data
stored over there.
329
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Interviewee: I guess it’s the other way around. The security protects the
high-value information that we have, which then drives the
business value. It’s the drive for protecting the value, as
opposed to driving for security.
Interviewee: All of the data that we have electronically, the data owner has
responsibility for it. One of the responsibilities of being a data
owner is to manage the life cycle of it. So, you classify those
into business records versus other kind of data and associate
that with the retention policy.
Then you need to figure out how you store that data. It’s the
data owner’s responsibility, how long does this need to be
retained. Does it fall outside the normal data retention
standards?
Interviewee: In terms of secure, yes, but more importantly, the value of that
information, if it is diminished and it is non-value add, then
storing that drives cost in terms of IT and management costs
for the storage and backups and everything else that happens
with it, which is a lot of the primary drivers for that.
330
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Craig: What are some of the motivations and some of the benefits to
outsourcing the storage of information?
And then, obviously, probably not just the storage space, it just
needs to be part of a broader technology strategy on what gets
outsourced and what stays in-house. It’s a risk versus benefit
discussion at that time, and strictly speaking, with all the kind
of cyber threats and with all the legal implications lately with
data breaches and the obligations that come along with it,
while, in the past, outsourcing was a cost-driven activity, now
that attraction might go away.
Craig: It’s not something you would take a risk on because you
need…?
331
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Interviewee: The risk appetite is where it all starts. The enterprise risk
management will define all of the different types of risks,
groups, grouping of risks, and then, each of these risk owners,
they will own the specific risk. But the appetite comes from the
top, from the board. What’s the risk appetite? How much risk
are you allowed to take for certain types of risk? That will allow
management to execute deviations from there.
Craig: Does the board define risk only in financial terms when they
write their risk appetite statement?
Craig: Do you think there are any additional security controls that
organisations should use when outsourcing?
332
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Not stop. It depends on if it’s privacy related stuff. For example, it depends on what’s
at stake when it’s a regulatory compliance activity. If you want
to qualify outsourcing versus [Software-as-a-Service] and
others. So if it’s outsourcing our infrastructure services, then
it’s not so much of an issue. But if it’s outsourcing in terms of
going into a [Software-as-a-Service] solution, then that would
be a little bit of a concern because then you need to look at is
this a multi-tenanted environment? How do we know when
stuff happens because some of the requirements around
notifying within a certain timeframe? How do we make sure
these things happen? Who owns the risk if that happens?
Recent issues around one of the recruitment portals here is a
good example of that. Is that the customer of that portal that is
liable versus the provider of the service? Obviously, it’s the
customer, so those kinds of things come, then you start losing
the value of outsourcing.
If you’re operating in a certain jurisdiction, and the number one outsourcing provider
there is not on good terms with a particular countries’ political
environment, it may not be a good thing to outsource. It won’t
affect the outsourcing decision. It would affect the selection of
the provider.
Absolutely. If there are jurisdictions where it’s not business-friendly, or where the
laws of the land require or drives very nationalistic approach,
for a global company like us, so unless you’re operating only in
that country.
It won’t stop, it would just increase our vigilance and cost, I guess. If it’s avoidable
with a choice, but the external threat environment I don’t
333
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Not necessarily outsource, it doesn’t influence the outsourcing decision, but where it
goes, it would be, and how it was managed, would definitely be
influenced. For example, board documents or cyber strategy
documents could stay in an outsourced provider facility that we
have full visibility and assurance that it’s being protected to our
standards or higher. And in some cases, we might have to use
an outsource provider because we probably are insecure
internally. We might find an outsource provider who’s far more
secure than we are. A good example would be
merger/demerger discussions where you need to have a lot of
third-party involvement. Most companies may not have a
secure data room that is externally accessible and allows for
collaboration. That’s not something you do every day, unless
your nature of business is consulting, so you might end up
outsourcing that data room service for that initiative to
somebody who’s running a virtual data room as a service,
which means they have the ability to onboard, offboard people
who have the ability to manage documents and do all the
things like watermarking and making sure who printed it and
have all sorts of controls, which typically makes it hard to
implement it in a large company environment. Internal
collaboration is not an issue. It’s when it comes to
merger/demerger discussions between two or three parties,
then you need to provide a common platform that all three can
trust, as opposed to one person’s premises.
It depends on how you look at it. That’s based on the assumption that if you do it in
outsourced, you’re not having that availability or – that’s a
contractual problem. So if you define your SLAs and your
requirements really clear up front, and find the right provider, I
don’t see why that would be a problem. What will happen is,
typically, if you have that high level of availability requirement,
and the SLAs around it, you narrow down who you can
outsource to, and then usually it’s one of the big players, which
comes with a big price tag. Big companies may be okay with
that, but then, big companies may have really good
infrastructure. I suppose all of this, the value versus cost
decision comes in.
334
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
ix. Other: If you had a very competitive environment, where your IP,
your bread and butter, is all in electronic format, and if you lose
that, then you’re going to run out of business. It’s a decision that
you’ve got to take very carefully. The bottom line is what’s the
impact if it’s lost or the integrity of the data gets changed, what’s
the impact? Do you have mechanisms? If you don’t have the
maturity to define those requirements up front, then it could be
tough.
Interviewee: I don’t think it makes it more secure. It just gives you the
perception that it’s somebody else’s problem, which could be
wrong.
Craig: How does your organisation store information that’s got very
little or low value?
Interviewee: Lower retention standards, and the controls around it are also
very minimal. And obviously, things like don’t use prime
storage for that sort of stuff. So, it goes in the standard file
share.
335
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Craig: But it wouldn’t dictate that you would raise or lower the value of
information that you hold? It more dictates the controls?
336
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Interviewee: No.
Craig: We’ve all heard of the impacts that a security breach can have
on some organisations. On a scale of 1 to 5 where 1 is low
importance and 5 is high importance, how important would
security breach impacts be on:
i. Public reputation L M H
It depends on what was breached. This is where the assessment of criticality of the
nature of the information – as a part of your risk assessment,
you look at impact to reputation, impact to brand, impact to
financials, health and safety. So, every breach you need to
assess the impact.
Absolutely.
Yes.
Yes.
v. Risk of litigation L M H
Yes.
Yes.
Yeah.
337
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
Yeah.
Craig: Have you ever had any resistance on security initiatives from
any stakeholders? Why?
Interviewee: Both.
Interviewee: You measure that by the amount of data breaches and the
impact. If you’ve had any business impact because of a
breach, how much dollars did you lose because – or how much
value did you lose because of a data breach. How much of our
intellectual property, or how much IP we have, that sort of stuff.
338
APPENDIX E: EXAMPLE TRANSCRIPT FROM AN INTERVIEW
The value of the IP. What’s the value of all the IP that we have
developed, and have we had any losses of any of those?
339
Appendix F: Descriptions of Concepts and
Relationships
Table F.1 summarises the findings from the analyses of the concepts discovered.
340
APPENDIX F: DEFINITIONS OF CONCEPTS
341
APPENDIX F: DEFINITIONS OF CONCEPTS
342
APPENDIX F: DEFINITIONS OF CONCEPTS
Table F.2 summarises the relationships that were discovered between the concepts.
sensitive.”
P1b The relationship where the ITCo3: “[if] the information is low
presence of low value information value [then] don’t worry about
causes an organisation to protecting it. We have this
decrease the level of security concept in our company of
controls. minimum viable security.”
P2a The relationship where the RetCo1: “not in an outsource
organisation maintains full control provider, but I will host it in a
over high value information to public cloud, yes”.
increase its security.
P2b The relationship where an FinCo1: “The customer doesn’t
organisation maintaining partial care that it wasn’t this
control over high value organisation that lost their data.
information increases its security. They trusted this organisation,
not the third party.”
P3a The relationship where the ability ITCo1: “I'd imagine if someone
for information to form the basis had credit card information that
of a core competency negatively would be something you'd want
affecting whether it can be stored to be really tight on. And sure, it
externally. might be great to have that
credit card information, but
you're better off finding another
way to use that customer
identity data, if you want to use
the data, and not keeping their
information ad-infinitum.”
P3b The relationship where ITCo1: “If something's non-core,
information does not form the then you've got the ability to go
basis of a core competency, out, but then if it's non-core you
which positively affects its ability probably don't care as much
to be stored externally. anyway.”
343
APPENDIX F: DEFINITIONS OF CONCEPTS
344
APPENDIX F: DEFINITIONS OF CONCEPTS
345
Appendix G: Data Structure
• Information is the key asset not the ICT systems it resides on Asset
• Information as an asset affect governance and structures
Information
• Full control avoids leaks from external parties and devices
• Partial control increases security but cannot decrease accountability Control
• No control reduces cost and responsibilities
• Value can be low or high and affects classification and controls Value
• High value can extend to being irreplaceable if it’s a trade secret
• Low value information can be secured using minimal efforts only Accepting
• This can increase security by conserving budget for higher value info Risk
• Public reputation affects customer trust and share (stock) price Environment
• Regulatory compliance can have severe impacts if not maintained Benefits
• Customer trust affected the risk of litigation
• Severe impacts from a breach include bankruptcy and loss of life Organisation Strategic
• Protection of trade secrets also severe but takes longer to manifest Benefits Impacts
• Expense frugality and increased productivity also benefits
346
Minerva Access is the Institutional Repository of The University of Melbourne
Author/s:
Horne, Craig Andrew
Title:
Understanding information security strategy in organisations
Date:
2018
Persistent Link:
http://hdl.handle.net/11343/227196
File Description:
Final thesis file