To read this content please select one of the options below:

Explaining small business InfoSec posture using social theories

Eli Rohn (Department of Information Systems Engineering, Ben Gurion University of the Negev, Beersheba, Israel)
Gilad Sabari (Department of Information Systems Engineering, Ben Gurion University of the Negev, Beersheba, Israel)
Guy Leshem (Department of Computer Science, Ashqelon Academic College, Ashqelon, Israel)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 14 November 2016

627

Abstract

Purpose

This study aims to investigate information technology security practices of very small enterprises.

Design/methodology/approach

The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory.

Findings

Only one-third of all the controls examined were designed properly and operated as expected. About half of the controls were either ill-designed or did not operate as intended. The social comparison theory and the rare events bias theory explain managers’s reliance on small experience samples which in turn leads to erroneous comprehension of their business environment, which relates to information security.

Practical implications

This information is valuable to executive branch policy makers striving to reduce information security vulnerability on local and national levels and small business organizations providing information and advice to their members.

Originality/value

Information security surveys are usually over-optimistic and avoid self-incrimination, yielding results that are less accurate than field work. To obtain grounded facts, the authors used the field research approach to gather qualitative and quantitative data by physically visiting active organizations, interviewing managers and staff, observing processes and reviewing written materials such as policies, procedure and logs, in accordance to common practices of security audits.

Keywords

Citation

Rohn, E., Sabari, G. and Leshem, G. (2016), "Explaining small business InfoSec posture using social theories", Information and Computer Security, Vol. 24 No. 5, pp. 534-556. https://doi.org/10.1108/ICS-09-2015-0041

Publisher

:

Emerald Group Publishing Limited

Copyright © 2016, Emerald Group Publishing Limited

Related articles