Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171
Loughborough University

Loughborough University Institutional Repository

Please use this identifier to cite or link to this item: https://dspace.lboro.ac.uk/2134/10128

Title: Information security policies in the UK healthcare sector: a critical evaluation
Authors: Stahl, Bernd Carsten
Doherty, Neil
Shaw, Mark
Keywords: Information security
Critical Research
Habermas
Ideology
Hegemony
Health care
Issue Date: 2012
Publisher: © Blackwell Publishing Ltd
Citation: STAHL, B.C., DOHERTY, N. and SHAW, M., 2012. Information security policies in the UK healthcare sector: a critical evaluation. Information Systems Journal, 22 (1), pp. 77 - 94
Abstract: All organisations must take active steps to maintain the security and integrity of their information resources, and nowhere is this strategy more critical than in hospitals where issues of information accuracy and patient confidentiality are paramount. Of all the tools at the information security manager's disposal, none is more widely valued and used than the information security policy. Much research therefore concentrates on the way in which information security policies contribute to the protection of systems from internal and external threats. Such work is legitimate and important, but it often fails to explore alternative views of security and related policies. Against this backdrop, this paper seeks to provide novel insights into the role and purpose of information security policies by reviewing them through a critical theoretical lens. It presents the results of a critical discourse analysis which looked for evidence of ideology and hegemony within a sample of information security policies from the UK's National Health Service. The findings support the contention that an alternative description of information security policies from a critical perspective provides better insights into existing problems than most mainstream work. The paper concludes by discussing the implications of the findings and future research avenues.
Description: This article is closed access, it was published in the serial Information Systems Journal [© Blackwell Publishing Ltd]. The definitive version is available at: http://onlinelibrary.wiley.com/doi/10.1111/j.1365-2575.2011.00378.x/abstract
Version: Published
DOI: 10.1111/j.1365-2575.2011.00378.x
URI: https://dspace.lboro.ac.uk/2134/10128
Publisher Link: http://onlinelibrary.wiley.com/doi/10.1111/j.1365-2575.2011.00378.x/abstract
ISSN: 1350-1917
Appears in Collections:Closed Access (Business School)

Files associated with this item:

File Description SizeFormat
j.1365-2575.2011.00378.x.pdf285.75 kBAdobe PDFView/Open

 

SFX Query

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.