1887
Volume 16, Issue 1
  • ISSN 1874-8767
  • E-ISSN: 1874-8775
USD
Buy:$35.00 + Taxes

Abstract

Abstract

Information security policies are particularly important when it comes to maintaining information security within an organization. As a result, creating an information security policy is an invaluable process that cannot be undermined. This study aims at investigating how these information security policies are created, specifically in banks, from a linguistic perspective. The study employed the use of corpora and analyzed ten information security policies of banks randomly collected online. The analyses were categorized under five levels of linguistic analysis which included: the mode, lexis, grammar, speech acts, and discourse. Some statistical analyses which involved clustering were also performed at the level of discourse in order to find similar patterns in the information security policies. The results show that banks use the same linguistic features when writing their information security policies. The results also reveal how these linguistic features are used to develop a comprehensive and effective information security policy.

Loading

Article metrics loading...

/content/journals/10.1075/etc.22001.tio
2023-11-17
2025-04-22
Loading full text...

Full text loading...

References

  1. Alqahtani, F. Hussain
    2017 Developing an information security policy: a case study approach. Procedia Computer Science1241. 69–697. 10.1016/j.procs.2017.12.206
    https://doi.org/10.1016/j.procs.2017.12.206 [Google Scholar]
  2. Alshaikh, Moneer, Sean B. Maynard, Atef Ahmad & Shanton Chang
    (2016) Information Security Policy: A Management Practice Perspective. Paper presented at the26th Australasian Conference on Information Systems Adelaide, South Australia.
    [Google Scholar]
  3. Anthony, Laurence
    2019Antconc (Version 3.5.8) [Computer Software]. Tokyo, Japan: Waseda University. https://www.laurenceanthony.net/software
    [Google Scholar]
  4. Biber, Douglas, Susan Conrad & Randi Reppen
    1998Corpus linguistics: investigating language structure and use. Cambridge: Cambridge University Press. 10.1017/CBO9780511804489
    https://doi.org/10.1017/CBO9780511804489 [Google Scholar]
  5. Butler, Christopher
    2004 Corpus studies and functional linguistic theories. Functions of Language891. 147–186. 10.1075/fol.11.2.02but
    https://doi.org/10.1075/fol.11.2.02but [Google Scholar]
  6. Cassetto, O.
    2019 The eight elements of an information security policy. Retrieved from: https://www.exabeam.com/information-security/information-security-policy/
  7. Flowerday, V. Stephen & Tite Tuyikeze
    2016 Information security policy development and implementation: The what, how and who. Computers & Security611. 169–18310.1016/j.cose.2016.06.002
    https://doi.org/10.1016/j.cose.2016.06.002 [Google Scholar]
  8. Fruhlinger, Josh
    2017 What is Information Security? Definition, Principles, and Jobs. Retrieved from: https://www.csoonline.com/article/3513899/what-is-information-security-definition-principles-and-jobs.html. (AccessedOctober 2020).
  9. Goel, Sanjay & Chengalur-Smith N. Indushobha
    2010 Metrics for characterizing the form of security policies. Journal of Strategic Information System19 (4): 281–295. 10.1016/j.jsis.2010.10.002
    https://doi.org/10.1016/j.jsis.2010.10.002 [Google Scholar]
  10. Gries, Th. Stefan
  11. Hardie, Andrew & Tony McEnery
    2010 On two traditions in corpus linguistics, and what they have in common. International Journal of Corpus Linguistics151. 384–394. 10.1075/ijcl.15.3.09har
    https://doi.org/10.1075/ijcl.15.3.09har [Google Scholar]
  12. Höne, Karin & Jan Eloff
    2002b What makes an effective information security policy?Network Security2(6): 14–16. 10.1016/S1353‑4858(02)06011‑7
    https://doi.org/10.1016/S1353-4858(02)06011-7 [Google Scholar]
  13. Ibarra, R. Peter & John I. Kitsuse
    1993 Vernacular constituents of moral discourse: An Interactionist proposal for the study of social problems. InGale Miller & James A. Holstein (eds.), Constructionalist Controversies: Issues in Social Problems Theory, 21–54. New York: Aldine de Gruyter.
    [Google Scholar]
  14. Johnston, C. Allen & Merrill Warkentin
    2010 Fear appeals and information security behaviors: an empirical study. MIS Quarterly341. 549–566. 10.2307/25750691
    https://doi.org/10.2307/25750691 [Google Scholar]
  15. Kamariza, Yvette
    2017 Implementation of information security policies in public organizations: top management as a Success Factor. Master’s Thesis, Jonkoping University.
    [Google Scholar]
  16. Leech, Geoffrey
    2004 Adding linguistic annotation. InDeveloping Linguistic Corpora: a guide to good practice, M. Wynne (ed.). Oxford: Oxbow books, 17–29.
    [Google Scholar]
  17. Miller, Andrew
    2007 Writing effective information security policies. Retrieved from: https://www.bankinfosecurity.com/writing-effective-information-security-policies-a-176 (AccessedOctober 2020).
  18. Neuenschwander, Sara
    2006 The social construction of claims-making: Bahamian anglers vs. non-resident sports-fishermen. Master’s Thesis, University of Central Florida.
    [Google Scholar]
  19. Noli, B. Lucila
    2016 Information security policy development: a literature review. International Journal of Innovative Research in Information Security, 31.
    [Google Scholar]
  20. Paapanen, Hanna, Michael Lapke & Mikko Siponen
    2020 State of the art in information security policy development. Computers and Security881. 10.1016/j.cose.2019.101608
    https://doi.org/10.1016/j.cose.2019.101608 [Google Scholar]
  21. Peltier, R. Thomas, Justin Peltier. & John A. Blackley
    2003Information Security Fundamentals. Boca Ranton, Fla: Auerbach Publications.
    [Google Scholar]
  22. Plappert, G. Lee
    2012 Phraseology and epistemology in scientific writing: a corpus-driven approach. PhD Thesis, University of Birmingham.
    [Google Scholar]
  23. Rhodes-Ousley, Mark
    2013Information Security: The Complete Reference, Second Edition. US: McGraw-Hill Osborne Media.
    [Google Scholar]
  24. Rostami, Elham, Fredrik Karlsson & Shang Gao
    2020 Requirements for computerized tools to design information security policies. Computer and Security991. 10.1016/j.cose.2020.102063
    https://doi.org/10.1016/j.cose.2020.102063 [Google Scholar]
  25. Searle, R. John
    1969Speech acts: An essay in the philosophy of language. Cambridge: Cambridge University Press. 10.1017/CBO9781139173438
    https://doi.org/10.1017/CBO9781139173438 [Google Scholar]
  26. Tongini-Bonelli, Elena
    2001Corpus Linguistics at Work. John Benjamins Publishing Co. 10.1075/scl.6
    https://doi.org/10.1075/scl.6 [Google Scholar]
/content/journals/10.1075/etc.22001.tio
Loading
/content/journals/10.1075/etc.22001.tio
Loading

Data & Media loading...

  • Article Type: Research Article
Keyword(s): corpus; corpus linguistics; corpus-driven; information; information security policy
This is a required field
Please enter a valid email address
Approval was successful
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error