Abstract
When two companies merge, technical infrastructures change, formal security policies get rewritten, and normative structures clash. The resultant changes typically disrupt the prevalent security culture as well. In this paper we use ET Hall’s (1959) theory of cultural message streams to evaluate the disruptions in security culture following a merger. Findings from our analysis would be beneficial to researchers to theorize about security culture formulation during a merger. At a practical level decision makers would find the analysis useful for engaging in strategic security planning.
Chapter PDF
Similar content being viewed by others
References
Backhouse, J., Dhillon, G.: Structures of responsibility and security of information systems. European Journal of Information Systems 5(1), 2–9 (1996)
Dhillon, G.: Managing information system security. Macmillan, London (1997)
Giddens, A.: The consequence of modernity. Stanford University Press, Stanford (1990)
Hall, E.T.: The silent language, 2nd edn. Anchor Books, New York (1959)
Helokunnas, T., Kuusisto, R.: Information security culture in a value net. In: Engineering Management Conference, IEMC 2003 on Managing Technologically Driven Organizations: The Human Side of Innovation and Change, pp. 190–194. IEEE Press, New York (2003)
Ramachandran, S., Rao, V.S.C., Goles, T., Dhillon, G.: Variations in Information Security Cultures across Professions: A Qualitative Study. Communications of the Association for Information Systems 33, 163–204 (2013)
Ruighaver, A.B., Maynard, S.B., Chang, S.: Organizational Security Culture: Extending the End-user Perspective. Computers & Security 26, 56–62 (2007)
Segev, A., Porra, J., Roldan, M.: Internet security and the case of Bank of America. Communications of the ACM 41(10), 81–87 (1998)
Von Solms, B.: Information Security—The Third Wave? Computers & Security 19, 615–620 (2000)
Vroom, C., Von Solms, R.: Towards Information Security Behavioral Compliance. Computers & Security 23, 191–198 (2004)
Walsham, G.: Interpreting information systems in organizations. John Wiley & Sons, Chichester (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Dhillon, G., Chowdhuri, R., Pedron, C. (2014). Organizational Transformation and Information Security Culture: A Telecom Case Study. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds) ICT Systems Security and Privacy Protection. SEC 2014. IFIP Advances in Information and Communication Technology, vol 428. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55415-5_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-55415-5_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55414-8
Online ISBN: 978-3-642-55415-5
eBook Packages: Computer ScienceComputer Science (R0)