Reconceptualizing the Human in the Loop : A Problematization of Taken-for-Granted Metaphors in Cybersecurity Research
Soliman, W., & Järveläinen, J. (2024). Reconceptualizing the Human in the Loop : A Problematization of Taken-for-Granted Metaphors in Cybersecurity Research. In ECIS 2024 : Proceedings of the 32nd European Conference on Information Systems. Association for Information Systems. https://aisel.aisnet.org/ecis2024/track02_general/track02_general/5/
Päivämäärä
2024Tekijänoikeudet
© 2024 AISeL
The use of metaphors is crucial to advancing not only scientific fields but also in facilitating the development of knowledge and understanding in general. While metaphors facilitate the exchange of novel concepts and ideas, they can also be a hindrance if we do not critically question the root metaphors and the extent to which they apply and do not apply to the subjects we study in cybersecurity research. We find two metaphors to be seemingly popular in characterizing the human actor: (1) the “frightened animal” metaphor with traceable roots to fear-inducing theories, such as Deterrence Theory, and (2) the “weakest link” metaphor with traceable roots to Taylorism and scientific management. We revisit the roots of these two metaphors, critically examine their applicability to the subject matter in cybersecurity, and provide suggestions for improving the status quo.
Julkaisija
Association for Information SystemsEmojulkaisun ISBN
978-1-958200-10-0Konferenssi
European Conference on Information SystemsKuuluu julkaisuun
ECIS 2024 : Proceedings of the 32nd European Conference on Information SystemsAsiasanat
Alkuperäislähde
https://aisel.aisnet.org/ecis2024/track02_general/track02_general/5/Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/213555468
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
A Conceptual Framework and Research Agenda for Harnessing Institutional Work in Green Information Systems
Lumivalo, Juuli; Elo, Jenny; Salmenautio, Niina (Association for Information Systems, 2024)This study advances the field of Green Information Systems (IS) by conceptualizing the role of institutions (humanly devised rules, norms, and beliefs) in sustainability transitions with IS. We propose a framework for ... -
Information Security Governance in Civil Aviation
Salmenpää, Tomi (Springer, 2022)This chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to ... -
Smart Terminal System of Systems’ Cyber Threat Impact Evaluation
Simola, Jussi; Pöyhönen, Jouni; Lehto, Martti (Academic Conferences International, 2023)Systems of system-level thinking is required when the purpose is to develop a coherent understanding of the ecosystem where every user and system requirements are divided into specific parts. The smarter project, as a part ... -
Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
Shaikh, Faheem Ahmed; Siponen, Mikko (Elsevier, 2023)Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.