Add abstract
Want to add your dissertation abstract to this database? It only takes a minute!
Search abstract
Search for abstracts by subject, author or institution
Want to add your dissertation abstract to this database? It only takes a minute!
Search for abstracts by subject, author or institution
Explaining policy differences as a function of diverse governance institutions
by Jim David Flowers
Institution: | Georgia Tech |
---|---|
Year: | 2016 |
Keywords: | Public policy; Institutional analysis; Information security |
Posted: | 02/05/2017 |
Record ID: | 2130241 |
Full text PDF: | http://hdl.handle.net/1853/54971 |
This study asks the question: “How does the structure of cybersecurity policy relate to differences in structure of policy governance of universities and colleges?” The study has three objectives. First, the study seeks to add to the body of knowledge concerning the relationship between the structure of cybersecurity policy processes and the security policies developed by those processes. Second, the study seeks to demonstrate the usefulness of the Institutional Grammar Tool, Rules Configurations, and other methods employed to analyze institutional configurations. Third, the study seeks to provide pragmatic suggestions for cybersecurity practitioners to systematically identify deficiencies in policy structure that contribute to less than optimum outcomes. Research on this question is necessary as no integrative framework exists for describing or predicting how organizations adopt and implement cyber security policy. The study proposes such a framework by integrating an ideal model for cyber security governance with the principles of the Institutional Analysis and Design framework (IAD). Four research universities of the University System of Georgia are subjected to a cross-case comparison of information security policies. Interviews and policy documents provide a database of institutional statements that are analyzed using IAD methods and tools. Prior research suggests that elements of policy structure, such as how the policy fits the organization’s objectives and culture, are linked to policy effectiveness. Research also suggests that how those elements of policy structure reflect external threats and organizational factors are determined by how the cybersecurity policy development is integrated into the governance of university wide policy. In addition to demonstrating the utility of an integrated approach to studying the problem of creating effective policy, findings demonstrate how a well-integrated cybersecurity governance structure provides better fit, constructs policies of appropriate scope, and is more likely to include the components of governance necessary for policy effectiveness. Findings also suggest that policy form, the readability of policy, may be improved if the documents are analyzed using the institutional grammar tools suggested by the IAD and if collaboration with users and managers to construct policy is encouraged. The capability of the methods employed by the study to identify deficiencies in cyber security governance structure that are manifested in less effective policy outcomes may aid policy makers as they strive to develop policy solutions to an ever changing security threat Advisors/Committee Members: Thomas, John C. (advisor), Kingsley, Gordon (committee member), Goodman, Seymour E. (committee member), Baker, Paul (committee member), Roch, Christine (committee member).
Want to add your dissertation abstract to this database? It only takes a minute!
Search for abstracts by subject, author or institution
Prediction of Upper Body Power of Cross-Country Sk...
|
|
Bitcoins
Mining, Transaction, Security Challenges and Futur...
|
|
Applying User-Centered Interface Design Methods to...
|
|
Head-Order Techniques and Other Pragmatics of Lamb...
|
|
Visualization of Interface Metaphor for Software
An Engineering Approach
|
|
Indoor Wireless Metering Networks
A Collection of Algorithms Enabling Low Power/Low ...
|
|
Automated Generation of Geometrically-Precise and ...
|
|
A Study on the Tone-Reservation Technique for Peak...
|
|