391
Views
24
CrossRef citations to date
0
Altmetric
Research Article

Conceptualising improvisation in information systems security

&
Pages 592-607 | Received 08 Nov 2010, Accepted 03 Jan 2012, Published online: 19 Dec 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Marko Niemimaa & Elina Niemimaa. (2019) Abductive innovations in information security policy development: an ethnographic study. European Journal of Information Systems 28:5, pages 566-589.
Read now
Elina Niemimaa & Marko Niemimaa. (2017) Information systems security policy implementation in practice: from best practices to situated practices. European Journal of Information Systems 26:1, pages 1-20.
Read now

Articles from other publishers (22)

Marko Niemimaa. (2023) Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agency. Information Technology & People.
Crossref
Farkhondeh Hassandoust & Allen C. Johnston. (2023) Peering through the lens of high‐reliability theory: A competencies driven security culture model of high‐reliability organisations. Information Systems Journal 33:5, pages 1212-1238.
Crossref
Karin Bernsmed, Guillaume Bour, Martin Lundgren & Erik Bergström. (2022) An evaluation of practitioners’ perceptions of a security risk assessment methodology in air traffic management projects. Journal of Air Transport Management 102, pages 102223.
Crossref
Ana Faizi, Ali Padyab & Andreas Naess. (2021) From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in Sweden. Information & Computer Security 30:2, pages 190-205.
Crossref
Felix BankoleProfProf, Ayankunle Taiwo & Ivan Claims. (2022) An extended digital forensic readiness and maturity model. Forensic Science International: Digital Investigation 40, pages 301348.
Crossref
Christian Bartelheimer, Philipp zur Heiden, Hedda Lüttenberg & Daniel Beverungen. (2022) Systematizing the lexicon of platforms in information systems: a data-driven study. Electronic Markets 32:1, pages 375-396.
Crossref
Emelie Mannebäck & Ali Padyab. (2021) Challenges of Managing Information Security during the Pandemic. Challenges 12:2, pages 30.
Crossref
Kaixin Gao, Keping Zhou & Zhipeng Liang. (2021) INFORMATION-FLOW-BASED SAFETY EDUCATION (IFSE): AN INDISPENSABLE PERSPECTIVE ON SAFETY EDUCATION. JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 27:7, pages 472-484.
Crossref
Erik Bergström, Fredrik Karlsson & Rose-Mharie Åhlfeldt. (2020) Developing an information classification method. Information & Computer Security 29:2, pages 209-239.
Crossref
Theo Simon. (2021) Revolution and stability in the study of the human factor in the security of information systems field : A systematic literature review over 30 years of publication. Revolution and stability in the study of the human factor in the security of information systems field : A systematic literature review over 30 years of publication.
A. J. Burns, Clay Posey & Tom L. Roberts. (2019) Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity. Information Systems Frontiers 23:2, pages 343-360.
Crossref
Aline Fernandes, Monideepa Tarafdar & Martin Spring. (2021) The nature of IT use in temporary organizations. The Journal of Strategic Information Systems 30:1, pages 101655.
Crossref
A. J. Burns. (2019) Security Organizing. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 50:4, pages 14-27.
Crossref
Erik Bergström, Martin Lundgren & Åsa Ericson. (2019) Revisiting information security risk management challenges: a practice perspective. Information & Computer Security 27:3, pages 358-372.
Crossref
Wenyu (Derek) Du, Junjie Wu, Shanshi Liu & Raymond A. Hackney. (2019) Effective organizational improvisation in information systems development: Insights from the Tencent messaging system development. Information & Management 56:4, pages 614-624.
Crossref
Princely Ifinedo, Nigussie Mengesha & Olumide Longe. 2019. Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D. Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D 303 315 .
Tove Frykmer, Christian Uhr & Henrik Tehler. (2018) On collective improvisation in crisis management – A scoping study analysis. Safety Science 110, pages 100-109.
Crossref
Martin Lundgren. (2018) Making information security research great again: Assumptions and practical aspects of case-study research in information security. Making information security research great again: Assumptions and practical aspects of case-study research in information security.
Marko Niemimaa. (2017) Information systems continuity process: Conceptual foundations for the study of the “social”. Computers & Security 65, pages 1-13.
Crossref
Marko Niemimaa & Anna Elina Laaksonen. 2015. Materiality, Rules and Regulation. Materiality, Rules and Regulation 223 249 .
Steve Leybourne, Gary Lynn & Morten Thanning Vendelø. (2014) Forms, Metaphors, and Themes: An Introduction to the Special Issue on Organizational Improvisation. Creativity and Innovation Management 23:4, pages 353-358.
Crossref
David Avison & Julien Malaurent. (2014) Qualitative Research in three IS journals: Unequal emphasis but common rigour, depth and richness. Systèmes d'information & management Volume 18:4, pages 75-123.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.