访问组织存储的用户数据——中国IT组织中围绕信息安全专业人员的分歧

IF 2.1 2区 文学 Q2 COMMUNICATION Chinese Journal of Communication Pub Date : 2021-07-28 DOI:10.1080/17544750.2021.1954962
Xiaofeng Ma, Hichang Cho
{"title":"访问组织存储的用户数据——中国IT组织中围绕信息安全专业人员的分歧","authors":"Xiaofeng Ma, Hichang Cho","doi":"10.1080/17544750.2021.1954962","DOIUrl":null,"url":null,"abstract":"Abstract With the rapid development of computer-based information systems in China, securing organizational systems as information assets is central to achieving a strategic advantage. Because information security (IS) experts with database access are the weakest link in the IS chain, scholarly contributions are needed in this important area. The interpretations of widespread data breaches committed by organizations’ information security experts have significant grounding. Drawing on social control theory, we propose a research framework to examine formal control, informal control, and self-control systems that can affect IS professionals’ perceptions and IS behaviors in Chinese IT organizations. We use in-depth interviews with IS professionals in Wuhan, Beijing, and Shenzhen to answer research questions relating to the research framework. The study’s primary contribution is to go beyond the extant IS research, which concentrates on sanction-based deterrence, and identify multiple dimensions rooted in social control perspectives. Based on interviews with practitioners and researchers, this study further advances our understanding of IS control deviance using information management and communication-related approaches.","PeriodicalId":46367,"journal":{"name":"Chinese Journal of Communication","volume":"47 3 1","pages":"1 - 33"},"PeriodicalIF":2.1000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Access to user data stored by organizations—divides surrounding information security professionals in Chinese IT organizations\",\"authors\":\"Xiaofeng Ma, Hichang Cho\",\"doi\":\"10.1080/17544750.2021.1954962\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract With the rapid development of computer-based information systems in China, securing organizational systems as information assets is central to achieving a strategic advantage. Because information security (IS) experts with database access are the weakest link in the IS chain, scholarly contributions are needed in this important area. The interpretations of widespread data breaches committed by organizations’ information security experts have significant grounding. Drawing on social control theory, we propose a research framework to examine formal control, informal control, and self-control systems that can affect IS professionals’ perceptions and IS behaviors in Chinese IT organizations. We use in-depth interviews with IS professionals in Wuhan, Beijing, and Shenzhen to answer research questions relating to the research framework. The study’s primary contribution is to go beyond the extant IS research, which concentrates on sanction-based deterrence, and identify multiple dimensions rooted in social control perspectives. Based on interviews with practitioners and researchers, this study further advances our understanding of IS control deviance using information management and communication-related approaches.\",\"PeriodicalId\":46367,\"journal\":{\"name\":\"Chinese Journal of Communication\",\"volume\":\"47 3 1\",\"pages\":\"1 - 33\"},\"PeriodicalIF\":2.1000,\"publicationDate\":\"2021-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Chinese Journal of Communication\",\"FirstCategoryId\":\"98\",\"ListUrlMain\":\"https://doi.org/10.1080/17544750.2021.1954962\",\"RegionNum\":2,\"RegionCategory\":\"文学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMMUNICATION\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Chinese Journal of Communication","FirstCategoryId":"98","ListUrlMain":"https://doi.org/10.1080/17544750.2021.1954962","RegionNum":2,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMMUNICATION","Score":null,"Total":0}
引用次数: 0

摘要

随着计算机信息系统在中国的快速发展,保护组织系统作为信息资产是获得战略优势的核心。由于具有数据库访问能力的信息安全专家是信息安全链中最薄弱的环节,这一重要领域需要学术贡献。组织的信息安全专家对广泛的数据泄露的解释有重要的依据。在社会控制理论的基础上,我们提出了一个研究框架来考察正式控制、非正式控制和自我控制系统对中国IT组织中IT专业人员的认知和行为的影响。我们对武汉、北京和深圳的信息系统专业人士进行了深度访谈,以回答与研究框架相关的研究问题。该研究的主要贡献是超越了现有的以制裁为基础的威慑研究,并从社会控制的角度确定了多个维度。基于对从业人员和研究人员的访谈,本研究进一步推进了我们对信息管理和通信相关方法的IS控制偏差的理解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Access to user data stored by organizations—divides surrounding information security professionals in Chinese IT organizations
Abstract With the rapid development of computer-based information systems in China, securing organizational systems as information assets is central to achieving a strategic advantage. Because information security (IS) experts with database access are the weakest link in the IS chain, scholarly contributions are needed in this important area. The interpretations of widespread data breaches committed by organizations’ information security experts have significant grounding. Drawing on social control theory, we propose a research framework to examine formal control, informal control, and self-control systems that can affect IS professionals’ perceptions and IS behaviors in Chinese IT organizations. We use in-depth interviews with IS professionals in Wuhan, Beijing, and Shenzhen to answer research questions relating to the research framework. The study’s primary contribution is to go beyond the extant IS research, which concentrates on sanction-based deterrence, and identify multiple dimensions rooted in social control perspectives. Based on interviews with practitioners and researchers, this study further advances our understanding of IS control deviance using information management and communication-related approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
4.70
自引率
3.70%
发文量
38
期刊最新文献
How do corporate social responsibility perceptions facilitate advocacy behavior? The roles of organizational pride and responsible leadership Exploring freedom in mobile connectivity: a moderated mediation model linking mobile social media modes, availability pressure, and media habits Communicating LGBTQ-supportive CSR for corporate legitimacy: a cultural discourse analysis in Hong Kong Pro-liberalism vs. Nationalism: how critical opinion leaders challenge the persuasive effect of propaganda in China When politics meets dating: how moral concern, utopianism, and communication competence predict willingness to date across the political divide
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1