Abstract

This article presents six ways to use work system concepts for describing, analyzing, or evaluating IS security at the system rather than enterprise level. As a whole, this theory-based view delves into topics that typical technology or process-focused cybersecurity approaches may overlook. This article introduces work system theory and then summarizes six lenses that each imply broadly applicable questions and issues for describing, analyzing, or evaluating IS security situations, tools, or systems.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call