Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kenneth J. Knapp is active.

Publication


Featured researches published by Kenneth J. Knapp.


Information Management & Computer Security | 2006

Information security: management's effect on culture and policy

Kenneth J. Knapp; Thomas E. Marshall; R. Kelly Rainer; F. Nelson Ford

Purpose – This study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organizations security culture and level of security policy enforcement.Design/methodology/approach – The project used a combination of qualitative and quantitative techniques. The grounded theory approach was used to analyze responses to open‐ended questions answered by 220 certified information system security professionals. Using these responses, a survey instrument was developed. Survey results were analyzed using structural equation modeling.Findings – Evidence suggests that top management support is a significant predictor of an organizations security culture and level of policy enforcement.Research limitations/implications – During instrument validation, a special effort removed survey items that appeared overly intrusive to the respondents. In this endeavor, an expert panel of security practitioners evaluated all candidate items on a willingness‐to‐answer scal...


International Journal of Information Security and Privacy | 2007

Information Security Effectiveness: Conceptualization and Validation of a Theory

Kenneth J. Knapp; Thomas E. Marshall; R. Kelly Rainer; F. Nelson Ford

Taking a sequential qualitative-quantitative methodological approach, we propose and test a theoretical model that includes four variables through which top management can positively influence security effectiveness: user training, security culture, policy relevance, and policy enforcement. During the qualitative phase of the study, we generated the model based on textual responses to a series of questions given to a sample of 220 information security practitioners. During the quantitative phase, we analyzed survey data collected from a sample of 740 information security practitioners. After data collection, we analyzed the survey responses using structural equation modeling and found evidence to support the hypothesized model. We also tested an alternative, higher-order factor version of the original model that demonstrated an improved overall fit and general applicability across the various demographics of the sampled data. We then linked the finding of this study to existing top management support literature, general deterrence theory research, and the theoretical notion of the dilemma of the supervisor.


Information Systems Management | 2006

Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments

Kenneth J. Knapp; William R. Boulton

Abstract On the basis of a review of information warfare literature from 1990 to mid-2005, this article presents a framework of 12 important trends. These trends demonstrate the transformation of information warfare from primarily a military issue into a major commercial issue as well. Corporate IS managers need to understand the growing cyberwar threats and implement appropriate strategies to mitigate risk.


Information Systems Security | 2006

The Top Information Security Issues Facing Organizations: What Can Government do to Help?

Kenneth J. Knapp; Thomas E. Marshall; R. Kelly Rainer; Dorsey W. Morrow

Abstract Considering that many organizations today are fully dependent on information technology for survival,1 information security is one of the most important concerns facing the modern organization. The increasing variety of threats and ferociousness of attacks has made protecting information a complex challenge.2 Improved knowledge of the critical issues underlying information security can help practitioners, researchers, and government employees alike to understand and solve the biggest problems. To this end, the International Information Systems Security Certification Consortium [(ISC)2]® teamed up with Auburn University researchers to identify and rank the top information security issues in two sequential, but related surveys. The first survey involved a worldwide sample of 874 certified information system security professionals (CISSPs)®, who ranked a list of 25 information security issues based on which ones were the most critical facing organizations today. In a follow-on survey, 623 U.S.-based...


hawaii international conference on system sciences | 2007

Information Security and Task Interdependence: An Exploratory Investigation

Kenneth J. Knapp; Thomas E. Marshall

This sequential qualitative-quantitative study investigates reported levels of task interdependence by certified information security professionals from organizations worldwide. The empirical tests show that information security ranked high in task interdependence compared to other information system related tasks. Additionally, comparing results from a different survey, information security work demonstrates higher levels of reported task interdependence than telecommunications software development work. We present the results of a demographic analysis of the survey taken by 936 certified information security professionals. Overall, the results suggest that information security work in organizations requires high levels of task interdependence. These findings have implications for researchers by identifying task interdependence-related topics for future study. For practitioners, these findings provide relevant insight into the nature of information security work in organizations


Archive | 2007

Ten Information Warfare Trends

Kenneth J. Knapp; William R. Boulton


Communications of The Ais | 2003

Defense Mechanisms of Biological Cells: A Framework for Network Security Thinking

Kenneth J. Knapp; R. Franklin Morris; R. Kelly Rainer; Terry Anthony Byrd


The Journal of Digital Forensics, Security and Law | 2007

The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research

Kenneth J. Knapp; F. Nelson Ford; Thomas E. Marshall; R. Kelly Rainer


Archive | 2008

Security Architecture of Biological Cells: An Example of Defense in Depth

Kenneth J. Knapp; R. Franklin Morris


Information Security Management Handbook, 6th ed. | 2007

Top Management Support Essential for Effective Information Security.

Kenneth J. Knapp; Thomas E. Marshall

Collaboration


Dive into the Kenneth J. Knapp's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge