when more is less
violation of information security policies
sanctions and neutralization
fatigue and habituation
neuroscientific perspective on security warning
are users more than just the weakest link
SMEs and IT security Investments
decreasing it investments:
security between sees and large companies
problematic assumptions in information security research:
AIM: identify relevant sme constraints in an organizational it sec context and examine how these constraint influence it security investment decisions in smes
Qualitative Study
interviews were recorded and transcribed
topics:
company profile: please provide you company and role
it security status quo: How would you rate it sec. awareness in your company
processes (How do you decide upon it sec investments)
stakeholder perspective: (which kind of external support do you consider regarding it security investments and implementation?
need for action: What need for action do you see in the are of it sec. especially for sees
results: limited ressources
Results: Low formalization level
-budget planing (lack thereof): no structured budget planning process in general or for it spending in particular
-multiple roles or responsibilities:
understaffing as a common feature in smes, so managing directors are additionally responsible for it and it security
-undocumented processes: non existent, undefinded or undocumented processes
geographical insularity
strategic outlook
conslusion
non generaliazable assumptions and findings in the information security literature
practical implications