Back to Search Start Over

Cybersecurity technologies : a study of adaptation in a government organisation

Authors :
Cecez-Kecmanovic, Dubravka, Information Systems, Technology & Management, Australian School of Business, UNSW
Fernandez, Walter, Information Systems, Technology & Management, Australian School of Business, UNSW
Chemsi, Rachid, Information Systems, Technology & Management, Australian School of Business, UNSW
Cecez-Kecmanovic, Dubravka, Information Systems, Technology & Management, Australian School of Business, UNSW
Fernandez, Walter, Information Systems, Technology & Management, Australian School of Business, UNSW
Chemsi, Rachid, Information Systems, Technology & Management, Australian School of Business, UNSW
Publication Year :
2019

Abstract

Cybersecurity emerges as an exemplary case of human-technology entanglement. Cybersecurity technologies that monitor security breaches, protect Information Technology (IT) infrastructure, and respond to and counter-attack cybercrimes, are getting deployed at an increasing rate across organisations worldwide. These technologies are highly complex, and their deployment involves profound technological, organisational and social transformation in an environment of ever-increasing cyber threats and the dramatic rise of interconnected digital devices. These present an urgent challenge for all stakeholders who need to understand the cybersecurity phenomenon in order to deal with its complex social and technological implications. This thesis explores the cybersecurity phenomenon in the context of government organisations responsible for the deployment, implementation and use and effects of cybersecurity technologies. A broad literature review on cybersecurity demonstrates that the dominant research focus has been on the technical aspects of cybersecurity technologies, including their design, functionality and performance, as well as recommending best practices. Limited research in information systems (IS) and social sciences has also addressed social and organisational aspects, primarily concerned with issues around privacy, surveillance and human rights, data sharing and protection, legislation and law enforcement, and psychological profiling of attackers. On the other hand, IS literature has addressed IT implementation, organisational change and adaptation in organisational context, focusing on specific IT systems (for example on ERP and CRM) but not cybersecurity technologies. Overall, the literature review shows that there is a lack of understanding of the cybersecurity phenomenon and the complex processes of the deployment, implementation and use of cybersecurity technologies.This thesis therefore aims to contribute to better understanding of cybersecurity technologies

Details

Database :
OAIster
Notes :
English
Publication Type :
Electronic Resource
Accession number :
edsoai.on1130304318
Document Type :
Electronic Resource