Organisational Factors and IT Professionals' View of Wireless Network Vulnerability Assessments

作者: Keir Dyce , Mary Barrett

DOI:

关键词:

摘要: The paper reports on a survey-based study of Australian computer security professionals' use and opinions about two types wireless vulnerability assessment (WNV A): monitoring penetration testing. An initially surprising finding was how little both are used, despite the ease with which networks can be attacked, lack clear obstacles to using them. In light aspects organisational culture, including decision-making style professional identity, survey findings become more explicable. Senior management, even IT staff themselves, may still hold traditional, 'wired network' view their organisation. 'Culture' also explain why time expertise (rather than financial resources), senior management's discomfort idea hacking into network, mean neither nor testing is regularly though fairly well understood. explores culture limit way WNV A users go process, cultural shift could help change users' perception risks rewards As. This possibly threaten 's however, this needs further research.

参考文章(21)
Panos Lekkas, Randall K. Nichols, Wireless Security: Models, Threats, and Solutions ,(2001)
Robert Dick Gillespie, Dexter C. Dunphy, Organizational Change by Choice ,(1982)
Justin Peltier, Thomas R. Peltier, Managing A Network Vulnerability Assessment ,(2003)
R.R. Henning, Vulnerability assessment in wireless networks symposium on applications and the internet. pp. 358- 362 ,(2003) , 10.1109/SAINTW.2003.1210186
Herbert A. Simon, Rational Decision-Making in Business Organizations The American Economic Review. ,vol. 69, pp. 493- 513 ,(1979)
Phil Spurling, Promoting security awareness and commitment Information Management & Computer Security. ,vol. 3, pp. 20- 26 ,(1995) , 10.1108/09685229510792988
John M. Jermier, John W. Slocum, Louis W. Fry, Jeannie Gaines, Organizational Subcultures in a Soft Bureaucracy: Resistance Behind the Myth and Facade of an Official Culture Organization Science. ,vol. 2, pp. 170- 194 ,(1991) , 10.1287/ORSC.2.2.170
Ari Takanen, Petri Vuorij�rvi, Marko Laakso, Juha R�ning, Agents of responsibility in software vulnerability processes Ethics and Information Technology. ,vol. 6, pp. 93- 110 ,(2004) , 10.1007/S10676-004-1266-3