Author List: Spears, Janine L.; Barki, Henri;
MIS Quarterly, 2010, Volume 34, Issue 3, Page 503-A5.
This paper examines user participation in information systems security risk management and its influence in the context of regulatory compliance via a multi-method study at the organizational level. First, eleven informants across five organizations were interviewed to gain an understanding of the types of activities and security controls in which users participated as part of Sarbanes-Oxley compliance, along with associated outcomes. A research model was developed based on the findings of the qualitative study and extant user participation theories in the systems development literature. Analysis of the data collected in a questionnaire survey of 228 members of ISACA, a professional association specialized in information technology governance, audit, and security, supported the research model. The findings of the two studies converged and indicated that user participation contributed to improved security control performance through greater awareness, greater alignment between IS security risk management and the business environment, and improved control development. While the IS security literature often portrays users as the weak link in security, the current study suggests that users may be an important resource to IS security by providing needed business knowledge that contributes to more effective security measures. User participation is also a means to engage users in protecting sensitive information in their business processes.
Keywords: Information security; Sarbanes-Oxley Act; security risk management; user participation
Algorithm:

List of Topics

#108 0.211 model research data results study using theoretical influence findings theory support implications test collected tested based empirical empirically context paper
#186 0.205 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#253 0.162 user involvement development users satisfaction systems relationship specific results successful process attitude participative implementation effective application authors suggested user's contingency
#264 0.067 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative mitigate failures failure cause mitigation
#269 0.066 participation activities different roles projects examined outcomes level benefits conditions key importance isd suggest situations contextual furthermore benefit levels focus
#137 0.057 phase study analysis business early large types phases support provided development practice effectively genres associated different sensemaking including form technologies