field. To substantiate the findings of this study,
further research must address the classification of
challenges for organisations in general. Therefore,
future research could extend the data collection to a
larger number of participants, companies and
branches for comparison. However, the enhanced
understanding of the position and challenges of IT
consulting firms with regard to ISIM provide
valuable insight for companies that want to improve
their internal and inter-organisational ISIM.
REFERENCES
Ab Rahman, N. H., and Choo, K.-K. R. (2015). A survey
of information security incident handling in the cloud.
Computers & Security, 49, 45–69.
Ahmad, A., Hadgkiss, J., and Ruighaver, A. B. (2012).
Incident response teams – Challenges in supporting
the organisational security function. Computers &
Security, 31(5), 643–652.
Bailey, J., Kandogan, E., Haber, E., and Maglio, P. P.
(2007). Activity-based management of IT service
delivery. In E. Kandogan (Ed.), Symposium on
Computer human interaction for the management of
information technology. New York: ACM.
Bartnes, M., Moe, N. B., and Heegaard, P. E. (2016). The
future of information security incident management
training: A case study of electrical power companies.
Computers & Security, 61, 32–45.
Bryman, A., and Bell, E. (2015). Business research
methods (Fourth edition). Oxford: University Press.
Cichonski, P., Millar, T., Grance, T., and Scarfone, K.
(2012). NIST 800-61, Revision 2: Computer security
incident handling guide. Gaithersburg, MD: National
Institute of Standards and Technology.
Croasmun, J. T., and Ostrom, L. (2011). Using Likert-
Type Scales in the Social Sciences. Journal of Adult
Education, 40(1), 19–22.
Cusick, J. J., and Ma, G. (2010). Creating an ITIL inspired
Incident Management approach: Roots, response, and
results. In L. P. Gaspary (Ed.), 2010 IEEE/IFIP
Network Operations and Management Symposium
workshops (pp. 142–148). Piscataway, NJ: IEEE.
Denscombe, M. (2014). The Good Research Guide: For
Small-Scale Social Research Projects (5th ed.).
Maidenhead: McGraw-Hill Education.
European Union (EU) (2016a). Directive 2016/1148 of the
European Parliament and of the Council of 6 July
2016 concerning measures for a high common level of
security of network and information systems across
the Union.
European Union (EU) (2016b). Regulation 2016/679 of
the European Parliament and of the Council of 27
April 2016 on the protection of natural persons with
regard to the processing of personal data and on the
free movement of such data, and repealing Directive
95/46/EC (General Data Protection Regulation).
Hove, C., Tårnes, M., Line, M. B., and Bernsmed, K.
(2014). Information Security Incident Management:
Identified Practice in Large Organizations. In F.
Freiling (Ed.), 8th Int Conf on IT Security Incident
Management and IT Forensics (pp. 27–46).
Piscataway, NJ: IEEE.
International Organization for Standardization (ISO)
(2016). ISO/IEC 27035:2016: Information technology
-- Security techniques -- Information security incident
management.
Jaatun, M. G., Albrechtsen, E., Line, M. B., Johnsen, S.
O., Wærø, I., et al. (2008). A Study of Information
Security Practice in a Critical Infrastructure
Application. In C. Rong, M. G. Jaatun, J. Ma, F. E.
Sandnes, & L. T. Yang (Eds.), Lecture Notes in
Computer Science: Vol. 5060. Autonomic and trusted
computing (pp. 527–539). Berlin: Springer.
Johannesson, P., and Perjons, E. (2014). An introduction
to design science (1. Aufl.). Cham: Springer.
Line, M. B. (2013). A Case Study: Preparing for the Smart
Grids - Identifying Current Practice for Information
Security Incident Management in the Power Industry.
In H. Morgenstern (Ed.), 7th Int Conf on IT Security
Incident Management and IT Forensics (pp. 26–32).
Piscataway, NJ: IEEE.
O’Brien, R. (2016). Privacy and security. Business
Information Review, 33(2), 81–84.
Schutt, R. K. (2015). Investigating the social world: The
process and practice of research (8.ed.). Thousand
Oaks, Calif.: Sage.
Swedish Civil Contingencies Agency (MSB) (2012).
Nationellt system för it-incidentrapportering. (DN:
2012-2637).
Swedish Civil Contingencies Agency (MSB) (2017).
Årsrapport it-incidetnrapportering 2016. (DN 2016-
6304-7).
Tankard, C. (2016). What the GDPR means for
businesses. Network Security, 2016(6), 5–8.
Tøndel, I. A., Line, M. B., and Jaatun, M. G. (2014).
Information security incident management: Current
practice as reported in the literature. Computers &
Security, 45, 42–57.
Werlinger, R., Hawkey, K., and Beznosov, K. (2009). An
integrated view of human, organizational, and
technological challenges of IT security management.
Information Management & Computer Security, 17(1),
4–19.
Werlinger, R., Hawkey, K., Muldner, K., Jaferian, P., and
Beznosov, K. (2008). The challenges of using an
intrusion detection system. In L. F. Cranor (Ed.),
Proceedings of the 4th symposium on Usable privacy
and security (p. 107). New York: ACM.
Werlinger, R., Muldner, K., Hawkey, K., and Beznosov,
K. (2010). Preparation, detection, and analysis: The
diagnostic work of IT security incident response.
Information Management & Computer Security, 18(1),
26–42.
Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management
37