Abstract
This chapter points out who is the IT security team target audience, why and how they should communicate their message and which messages they should propagate. We complement these three aspects with references to marketing and psychology literature that provides security leaders with useful tips to sell security.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See Section 1.12.
- 2.
Information assurance, a broader term than information security, delivers a suitable level of protection for the organisation’s information (Ezingeard et al. 2007, pp. 96–118).
- 3.
To support the business with their IT security advice and actions. See Section 1.19.
- 4.
See Section 1.13.
- 5.
See Section 1.19.
- 6.
For example, an unaware user double clicking on an email attachment could set into motion a destructive piece of malware in the corporate network.
- 7.
ENISA (2006), p. 52.
- 8.
The IT security incident database we proposed in Section 1.15 could be of help in this scenario.
- 9.
Kotler (2003), pp. 443–452.
- 10.
One-way communication. See Section 7.2.
- 11.
According to Kotler (2003), p. 15, the marketing mix is a set of marketing tools (product, price, promotion and place) that a firm uses to pursue its marketing objectives in the target market.
- 12.
The 7 Ps of the “extended marketing mix” of Boots and Bitner expands the number of variables to control from four in the original marketing mix to seven. Extracted from http://www.12manage.com/methods_booms_bitnerPs.html. Last accessed 28-09-2009.
- 13.
Albrechtsen and Hovden (2009), pp. 477 and 487.
- 14.
Albrechtsen and Hovden (2009), p. 484.
- 15.
Albrechtsen and Hovden (2009), p. 481.
- 16.
The manufacturer uses advertising and promotion to induce customers to ask intermediaries for the product (Kotler 2003, p. 511).
- 17.
See Section 10.13.
- 18.
Albrechtsen and Hovden (2009), p. 484.
- 19.
Albrechtsen and Hovden (2009), p. 483.
- 20.
See Section 1.15.
- 21.
Albrechtsen and Hovden (2009), p. 488.
- 22.
See Section 7.11.
- 23.
Albrechtsen and Hovden (2009), p. 487.
- 24.
Albrechtsen and Hovden (2009), p. 484.
- 25.
Proximity outpowers similarity (Gladwell 2000, p. 35).
- 26.
See Chapter 4.
- 27.
See Section 2.3.
- 28.
Albrechtsen and Hovden (2009), p. 478.
- 29.
Such as the case of COSO (2004), pp. 1–103.
- 30.
From marketing lectures prepared by Stephen Lee and Robert Hattemer (Henley Management College MBA, 2006).
- 31.
Kotler et al. (2004), p. 183.
- 32.
Kotler et al. (2004), pp. 181–183.
- 33.
Based on its potential to contribute to a secure organisation.
- 34.
See Blythe (2006), p. 204.
- 35.
See Sections 4.2, Sections 4.3 and Sections 4.4.
- 36.
See Section 1.15.
- 37.
The threat to outsource IT and IT security services is growing.
- 38.
A potential argument against security tasks taken over by other IT teams.
- 39.
Adopted from Kotler (2004), pp. 13 and 29.
- 40.
According to Gronroos (1996), pp. 5–14.
- 41.
See Section 5.10.
- 42.
Gladwell (2000), pp. 38–46, refers to these individuals as connectors.
- 43.
More about viral marketing in wikipedia. Available at http://en.wikipedia.org/wiki/Viral_marketing. Last accessed 20-11-2009.
- 44.
A possible way to obtain this information could be checking the logs of the remote access infrastructure: Who access it most frequently?
- 45.
See Section 2.3.
- 46.
Privacy filters also benefit users’ sight. Although not security related, team members can also use this argument.
- 47.
American author of business and marketing books.
- 48.
Gladwell (2000), pp. 38–46.
- 49.
Win-win deals that increase in value between the provider and the customer (Bird 2000, p. 30).
- 50.
See Section 1.19.
- 51.
Term coined by Jay Conrad Levinson (1984) according to http://en.wikipedia.org/wiki/Guerrilla_marketing. Last accessed 20-09-2009.
- 52.
See the red team in Section 4.10.
- 53.
Guerrilla marketing teams revolve more on human psychology than current incident response teams do.
- 54.
According to Gladwell (2000), pp. 25 and 139.
- 55.
Cyber-attacks that target software installed on users’ workstations. See SANS (2009b). Last accessed 29-09-2009.
- 56.
See Section 10.5.
- 57.
See Section 4.10.
- 58.
See Chapter 8.
- 59.
See Section 7.2.
- 60.
See Section 5.2.
- 61.
Punset (2007), pp. 40–47.
- 62.
Ariely (2008), p. 4.
- 63.
Ariely (2008), “The context of our character”, Chapters 11 and 12.
- 64.
Ariely (2008), p. 212.
- 65.
Always following the personal data protection legislation that applies to the organisation. We recommend to seek legal advice beforehand.
- 66.
- 67.
This happens for example with medicines.
- 68.
Kahneman and Tversky (2000), p. 301.
- 69.
See Section 2.7.
References
Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Comput. Secur. 28, 476–490. Published by Elsevier (2009)
Ariely, D.: Predictably Irrational. Harper Collins, New York (2008)
Bird, D.: Commonsense Direct Marketing, 4th edn. Kogan Page, London (2000)
Blythe, J.: Principles & Practice of Marketing. TL EMEA Higher Education, p. 204 (2006)
COSO: Enterprise Risk Management Framework – Executive summary – Exposure Draft for Public Comment, pp. 1–103. Downloadable after purchase from http://www.coso.org/-ERM.htm, draft retrieved 2006 (2004)
ENISA European Network and Information Security Agency: A Users’ Guide: How to Raise Information Security Awareness, p. 52. ENISA (2006)
Ezingeard, J.N., McFadzean, E., Birchall, D.: Mastering the art of corroboration: a conceptual analysis of information assurance and corporate strategy alignment. J. Enterprise Inform. Manage. 20(1), 96–118 (2007)
Gladwell, M.: The Tipping Point: How Little Things Can Make a Big Difference, p. 132. Little Brown, Boston (2000)
Griffin, J.: Customer Loyalty: How to Earn It, How to Keep It, 2nd edn. (published in 2002), pp. 202–215. Wiley, New York (1995)
Gronroos, C.: Relationship marketing: strategic and tactical implications. Manage. Decis. J. 34(3), 5–14. Published by MCB UP (1996)
Kahneman, D., Tversky, A.: Choices, Values and Frames. Cambridge University Press, New York (2000)
Kotler, P.: Marketing Management, International edition, 11th edn, pp. 443–452. Prentice Hall, New Delhi/Upper Saddle River (2003)
McCorkell, G.: Direct and Database Marketing, p. 68. Kogan Page, London (1997)
Punset, E.: The Happiness Trip. Chelsea Green, White River Junction (2007)
SANS: The Top Cyber Security Risks. Data from Tipping Point and Qualys and input from Ed Skoudis and Rob Lee. Available at http://www.sans.org/top-cyber-security-risks/, Retrieved 20-09-2009 (2009b)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer Netherlands
About this chapter
Cite this chapter
Partida, A., Andina, D. (2010). Viral Marketing. In: IT Security Management. Lecture Notes in Electrical Engineering, vol 61. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-8882-6_7
Download citation
DOI: https://doi.org/10.1007/978-90-481-8882-6_7
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-8881-9
Online ISBN: 978-90-481-8882-6
eBook Packages: EngineeringEngineering (R0)