Old keys may not open new doors: the necessity of agility in cybersecurity policymaking

Masoud Afshari Mofrad, Babak Abedin, Alireza Amrollahi

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

3 Citations (Scopus)

Abstract

The volatile and dynamic nature of cyberspace has raised concerns over security and organisations are trying to make policies to protect their digital assets. However, policymaking in this field is still using traditional methods, which are slow and incompatible with the pace of change in the environment. Thus, it is vital to increase the speed of policy development in an agile and flexible manner. The question is, what does agility mean here and why is it important for organisations? To answer these questions, this study uses a systematic literature review approach and investigates 42 selected papers. By analysing the selected papers, a definition of cybersecurity policymaking agility is provided, and its importance in combating new cyberthreats is discussed. Building on and extending the organisational agility, policymaking and cybersecurity management research streams, the findings of this study propose new research opportunities for future studies.
Original languageEnglish
Title of host publicationACIS 2022 Proceedings
Place of PublicationMelbourne
PublisherAIS Electronic Library (AISeL)
Pages1-11
Number of pages11
Publication statusPublished - 2022
Event33rd Australasian Conference on Information Systems: The Changing Face of IS, ACIS 2022 - Melbourne, Australia
Duration: 4 Dec 20227 Dec 2022

Conference

Conference33rd Australasian Conference on Information Systems: The Changing Face of IS, ACIS 2022
Country/TerritoryAustralia
CityMelbourne
Period4/12/227/12/22

Keywords

  • Agile
  • information security policy
  • strategy
  • cybersecurity management
  • organisational agility

Fingerprint

Dive into the research topics of 'Old keys may not open new doors: the necessity of agility in cybersecurity policymaking'. Together they form a unique fingerprint.

Cite this