Improving Information Security Management in Nonprofit Organisations with Action Research
Carey-Smith, Mark T., Nelson, Karen J., & May, Lauren J. (2007) Improving Information Security Management in Nonprofit Organisations with Action Research. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Information Security Management Conference, 4 December 2007, Perth, Western Australia.
Information security is vital for protecting important assets of organisations, including the information resources and the organisation's reputation. In Australia, the nonprofit sector makes a significant contribution to society but is under represented in the information security literature. This paper describes research in progress that is investigating and improving information security management in some nonprofit organisations (NPOs), which incorporates a participatory action research methodology. This approach will enhance the skill set likely to be present in Australian nonprofit organisations, producing a more sustainable solution, as well as contributing to the open literature. The Technology Acceptance Model will be utilised as a referent model to aid data analysis. This research will directly benefit the nonprofit sector by highlighting the importance and relevance of effective information security management in their organisations. It will inform the policy making process of government actors when devising policy to assist NPOs.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Additional Information:||The contents of this conference can be freely accessed online via the conference's web page (see hypertext link).|
|Keywords:||Information security, information security management, action research, nonprofit organisations, technology acceptance model|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > INFORMATION SYSTEMS (080600) > Information Systems Management (080609)|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Institutes > Information Security Institute
|Copyright Owner:||Copyright 2007 Mark Carey-Smith, Karen Nelson, Lauren May|
|Copyright Statement:||Mark Carey-Smith, Karen Nelson, Lauren May ©2007. The author/s assign SCISSEC & Edith Cowan University a non-exclusive license to use this document for personal use provided that the article is used in full and this copyright statement is reproduced. The authors also grant a non-exclusive license to SCISSEC & ECU to publish this document in full in the Conference Proceedings. Such documents may be published on the World Wide Web, CD-ROM, in printed form, and on mirror sites on the World Wide Web. Any other usage is prohibited without the express permission of the authors.|
|Deposited On:||11 Aug 2008 00:00|
|Last Modified:||29 Feb 2012 13:36|
Repository Staff Only: item control page