101
|
Bi R, Davison R, Smyrnios K. The Role of Top Management Participation and IT Capability in Developing SMEs’ Competitive Process Capabilities. JOURNAL OF SMALL BUSINESS MANAGEMENT 2018. [DOI: 10.1111/jsbm.12380] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
|
102
|
Ifinedo P. Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions. INFORMATION RESOURCES MANAGEMENT JOURNAL 2018. [DOI: 10.4018/irmj.2018010103] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
Affiliation(s)
- Princely Ifinedo
- Department of Financial and Information Management, Cape Breton University, Sydney, Nova Scotia, Canada
| |
Collapse
|
103
|
Managing the introduction of information security awareness programmes in organisations. EUR J INFORM SYST 2017. [DOI: 10.1057/ejis.2013.27] [Citation(s) in RCA: 47] [Impact Index Per Article: 5.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
104
|
Turel O, Xu Z, Guo K. Organizational Citizenship Behavior Regarding Security: Leadership Approach Perspective. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2017. [DOI: 10.1080/08874417.2017.1400928] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Affiliation(s)
- Ofir Turel
- Mihaylo College of Business and Economics, California State University, Fullerton, CA, USA
| | - Zhengchuan Xu
- Information Management and Information Systems, Fudan University, Shanghai, China
| | - Ken Guo
- Mihaylo College of Business and Economics, California State University, Fullerton, CA, USA
| |
Collapse
|
105
|
Burns AJ, Roberts TL, Posey C, Bennett RJ, Courtney JF. Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts. DECISION SCIENCES 2017. [DOI: 10.1111/deci.12304] [Citation(s) in RCA: 24] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Affiliation(s)
- A. J. Burns
- Department of Computer Science, College of Business and Technology; The University of Texas at Tyler; 3900 University Blvd Tyler TX 75799
| | - Tom L. Roberts
- Department of Computer Science, College of Business and Technology; The University of Texas at Tyler; 3900 University Blvd Tyler TX 75799
| | - Clay Posey
- Department of Management, College of Business Administration; University of Central Florida; Orlando FL 32816
| | - Rebecca J. Bennett
- Department of Management, College of Business Administration; University of Central Florida; Orlando FL 32816
| | - James F. Courtney
- School of Accountancy, College of Business; Louisiana Tech University; Ruston LA 71272
| |
Collapse
|
106
|
A new perspective on neutralization and deterrence: Predicting shadow IT usage. INFORMATION & MANAGEMENT 2017. [DOI: 10.1016/j.im.2017.02.007] [Citation(s) in RCA: 39] [Impact Index Per Article: 4.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
107
|
D'Arcy J, Lowry PB. Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. INFORMATION SYSTEMS JOURNAL 2017. [DOI: 10.1111/isj.12173] [Citation(s) in RCA: 72] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Affiliation(s)
- John D'Arcy
- Department of Accounting and MISUniversity of Delaware 356 Purnell Hall Newark DE 19716 USA
| | - Paul Benjamin Lowry
- Department of Information SystemsCity University of Hong Kong P7912, Academic Building 1, 83 Tat Chee Avenue Kowloon Tong Kowloon Hong Kong
| |
Collapse
|
108
|
Yang SO, Hsu C, Sarker S, Lee AS. Enabling Effective Operational Risk Management in a Financial Institution: An Action Research Study. J MANAGE INFORM SYST 2017. [DOI: 10.1080/07421222.2017.1373006] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
109
|
A Deterrence Approach to Regulate Nurses’ Compliance with Electronic Medical Records Privacy Policy. J Med Syst 2017; 41:198. [DOI: 10.1007/s10916-017-0833-1] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/09/2017] [Accepted: 10/03/2017] [Indexed: 11/24/2022]
|
110
|
Shao Z, Feng Y, Hu Q. Impact of top management leadership styles on ERP assimilation and the role of organizational learning. INFORMATION & MANAGEMENT 2017. [DOI: 10.1016/j.im.2017.01.005] [Citation(s) in RCA: 33] [Impact Index Per Article: 4.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
111
|
Sommestad T, Karlzén H, Hallberg J. The Theory of Planned Behavior and Information Security Policy Compliance. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2017. [DOI: 10.1080/08874417.2017.1368421] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
112
|
da Veiga A, Martins N. Defining and identifying dominant information security cultures and subcultures. Comput Secur 2017. [DOI: 10.1016/j.cose.2017.05.002] [Citation(s) in RCA: 17] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
|
113
|
Balozian P, Leidner D. Review of IS Security Policy Compliance. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2017. [DOI: 10.1145/3130515.3130518] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Abstract
An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent and malicious insiders. We begin by defining the terms, developing a new taxonomy of insiders, and then providing a comprehensive review of articles on IS policy compliance for the past 26 years. Grounding the analysis in the literature, we inductively identify four themes to foster Information Security policy compliance among employees. The themes are: 1) IS management philosophy, 2) procedural countermeasures, 3) technical countermeasures, and 4) environmental countermeasures. We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory.
Collapse
|
114
|
Bauer S, Bernroider EW. From Information Security Awareness to Reasoned Compliant Action. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2017. [DOI: 10.1145/3130515.3130519] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Abstract
Despite the importance of information security, far too many organizations, in particular banks, are facing behavioral information security incidents. In the context given by the headquarters of a large European banking organization, this single case study investigates whether individual behavioral compliance with the information security policy is influenced by accumulated security information and information security awareness embedded within the theory of reasoned action in an extended norms approach. We collected empirical data through a three-staged process in which we conducted semi-structured interviews, implemented a survey to test the developed research hypotheses, and engaged in interactive presentations to discuss the results. In particular, the qualitative interviews strengthened internal validity of survey constructs related to neutralization techniques and internal channel use for information acquisition. We found that the attitude toward information security policy compliance, and not only social norms but also personal norms related to neutralization techniques, are all significant variables potentially mitigating the knowing-doing gap reported in related information security research. Besides emphasizing the importance of extended norms, which should be accounted for in information security awareness programs, we also highlight the use of internal and external channels to acquire information as initial drivers of awareness. The empirical findings provide implications to practice and advance theoretical development by generally supporting the developed model that accounts for compliant information security behavior at an international bank.
Collapse
Affiliation(s)
- Stefan Bauer
- WU-Vienna University of Economics and Business, Vienna, Austria
| | | |
Collapse
|
115
|
Karlsson F, Karlsson M, Åström J. Measuring employees’ compliance – the importance of value pluralism. INFORMATION AND COMPUTER SECURITY 2017. [DOI: 10.1108/ics-11-2016-0084] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This paper aims to investigate two different types of compliance measures: the first measure is a value-monistic compliance measure, whereas the second is a value-pluralistic measure, which introduces the idea of competing organisational imperatives.
Design/methodology/approach
A survey was developed using two sets of items to measure compliance. The survey was sent to 600 white-collar workers and analysed through ordinary least squares.
Findings
The results suggest that when using the value-monistic measure, employees’ compliance was a function of employees’ intentions to comply, their self-efficacy and awareness of information security policies. In addition, compliance was not related to the occurrence of conflicts between information security and other organisational imperatives. However, when the dependent variable was changed to a value-pluralistic measure, the results suggest that employees’ compliance was, to a great extent, a function of the occurrence of conflicts between information security and other organisational imperatives, indirect conflicts with other organisational values.
Research limitations/implications
The results are based on small survey; yet, the findings are interesting and justify further investigation. The results suggest that relevant organisational imperatives and value systems, along with information security values, should be included in measures for employees’ compliance with information security policies.
Practical implications
Practitioners and researchers should be aware that there is a difference in measuring employees’ compliance using value monistic and value pluralism measurements.
Originality/value
Few studies exist that critically compare the two different compliance measures for the same population.
Collapse
|
116
|
Sher ML, Talley PC, Yang CW, Kuo KM. Compliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff. INQUIRY: The Journal of Health Care Organization, Provision, and Financing 2017. [PMCID: PMC5798674 DOI: 10.1177/0046958017711759] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
The employment of Electronic Medical Records is expected to better enhance health care quality and to relieve increased financial pressure. Electronic Medical Records are, however, potentially vulnerable to security breaches that may result in a rise of patients’ privacy concerns. The purpose of our study was to explore the factors that motivate hospital information technology staff’s compliance with Electronic Medical Records privacy policy from the theoretical lenses of protection motivation theory and the theory of reasoned action. The study collected data using survey methodology. A total of 310 responses from information technology staff of 7 medical centers in Taiwan was analyzed using the Structural Equation Modeling technique. The results revealed that perceived vulnerability and perceived severity of threats from Electronic Medical Records breaches may be used to predict the information technology staff’s fear arousal level. And factors including fear arousal, response efficacy, self-efficacy, and subjective norm, in their turn, significantly predicted IT staff’s behavioral intention to comply with privacy policy. Response cost was not found to have any relationship with behavioral intention. Based on the findings, we suggest that hospitals could plan and design effective strategies such as initiating privacy-protection awareness and skills training programs to improve information technology staff member’s adherence to privacy policy. Furthermore, enhancing the privacy-protection climate in hospitals is also a viable means to the end. Further practical and research implications are also discussed.
Collapse
Affiliation(s)
- Ming-Ling Sher
- National Chung Cheng University, Chiayi, Taiwan (R.O.C.)
| | | | - Ching-Wen Yang
- Taichung Veterans General Hospitals, Taichung City, Taiwan (R.O.C.)
| | | |
Collapse
|
117
|
Yuryna Connolly L, Lang M, Gathegi J, Tygar DJ. Organisational culture, procedural countermeasures, and employee security behaviour. INFORMATION AND COMPUTER SECURITY 2017. [DOI: 10.1108/ics-03-2017-0013] [Citation(s) in RCA: 30] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security countermeasures tend to influence employee security actions. An increasing number of information security breaches in organisations presents a serious threat to the confidentiality of personal and commercially sensitive data. While recent research shows that humans are the weakest link in the security chain and the root cause of a great portion of security breaches, the extant security literature tends to focus on technical issues.
Design/methodology/approach
This paper builds on general deterrence theory and prior organisational culture literature. The methodology adapted for this study draws on the analytical grounded theory approach employing a constant comparative method.
Findings
This paper demonstrates that procedural security countermeasures and organisational culture tend to affect security behaviour in organisational settings.
Research limitations/implications
This paper fills the void in information security research and takes its place among the very few studies that focus on behavioural as opposed to technical issues.
Practical implications
This paper highlights the important role of procedural security countermeasures, information security awareness and organisational culture in managing illicit behaviour of employees.
Originality/value
This study extends general deterrence theory in a novel way by including information security awareness in the research model and by investigating both negative and positive behaviours.
Collapse
|
118
|
Abstract
Purpose
This paper aims to contribute to the understanding of goal setting in organizations, especially regarding the mitigation of conflicting productivity and security goals.
Design/methodology/approach
This paper describes the results of a survey with 200 German employees regarding the effects of goal setting on employees’ security compliance. Based on the survey results, a concept for setting information security goals in organizations building on actionable behavioral recommendations from information security awareness materials is developed. This concept was evaluated in three small- to medium-sized organizations (SMEs) with overall 90 employees.
Findings
The survey results revealed that the presence of rewards for productivity goal achievement is strongly associated with a decrease in security compliance. The evaluation of the goal setting concept indicates that setting their own information security goals is welcomed by employees.
Research limitations/implications
Both studies rely on self-reported data and are, therefore, likely to contain some kind of bias.
Practical implications
Goal setting in organizations has to accommodate for situations, where productivity goals constrain security policy compliance. Introducing the proposed goal setting concept based on relevant actionable behavioral recommendations can help mitigate issues in such situations.
Originality/value
This work furthers the understanding of the factors affecting employee security compliance. Furthermore, the proposed concept can help maximizing the positive effects of goal setting in organizations by mitigating the negative effects through the introduction of meaningful and actionable information security goals.
Collapse
|
119
|
Yoo DK. Impacts of a Knowledge Sharing Climate and Interdisciplinary Knowledge Integration on Innovation. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT 2017. [DOI: 10.1142/s0219649217500101] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
Interdisciplinary teams are often employed with the expectation of sparking innovation in their diverse range of knowledge. Empirical studies on functional diversity, however, have shown inconclusive results. The literature also illustrates that the secret, competitive, and multi-disciplinary atmosphere makes individuals reluctant to share their knowledge. To fill these research gaps, this study is to explore how innovation can be more effectively facilitated despite different mental models of interdisciplinary team members. By drawing upon social capital theory, this study presents a knowledge sharing climate (i.e. trusting relationships, openness, and learning orientations) and how the three dimensions differently influence innovation. This study also shows how interdisciplinary knowledge integration mediates between functional diversity and innovation to reconcile the mixed signal of the literature. Data were collected from 202 individual team members, and structure equation modelling was employed to test the research model. Empirical results indicate that innovation is significantly affected by interdisciplinary knowledge integration and openness. Functional diversity and trusting relationships do not have direct impacts on innovation, but they are mediated by interdisciplinary knowledge integration. The findings of this study have theoretical and practical implications which are discussed in the paper.
Collapse
Affiliation(s)
- Dong Kyoon Yoo
- Virginia State University, 1 Hayden Dr., Petersburg, VA 23806, USA
| |
Collapse
|
120
|
An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. Comput Secur 2017. [DOI: 10.1016/j.cose.2016.12.016] [Citation(s) in RCA: 52] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
|
121
|
Humaidi N, Balakrishnan V. Indirect effect of management support on users' compliance behaviour towards information security policies. Health Inf Manag 2017; 47:17-27. [PMID: 28537207 DOI: 10.1177/1833358317700255] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
BACKGROUND Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. OBJECTIVE The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. METHOD Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. RESULTS Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. CONCLUSION The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management-user values and the nature of compliance towards ISPs among selected health professionals, this study has made a unique contribution to the literature.
Collapse
|
122
|
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method. JOURNAL OF STRATEGIC INFORMATION SYSTEMS 2017. [DOI: 10.1016/j.jsis.2016.08.005] [Citation(s) in RCA: 46] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
123
|
Worker outcomes of LGBT-supportive policies: a cross-level model. EQUALITY, DIVERSITY AND INCLUSION: AN INTERNATIONAL JOURNAL 2017. [DOI: 10.1108/edi-07-2016-0058] [Citation(s) in RCA: 25] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
The purpose of this paper is to develop a cross-level conceptual model of organizational- and individual-level outcomes of lesbian, gay, bisexual, and transgender (LGBT)-supportive policies for all workers regardless of their sexual orientation.
Design/methodology/approach
This is a conceptual paper based on an integration of propositions from perceived organizational support and organizational justice theories.
Findings
The model suggests that LGBT-supportive policies should be related to perceptions of organizational support directly and indirectly through diversity climate and perceptions of distributive, procedural, and interactional justice.
Practical implications
The model implies that employees should feel more supported and more fairly treated among firms with LGBT-supportive policies and practices, and that these feelings will be reciprocated.
Originality/value
This is the first paper to develop propositions about the outcomes of LGBT-supportive policies for all workers, and advances the literature by developing a multi-level model of outcomes of these policies.
Collapse
|
124
|
Silic M. Explaining Organizational Employee Computer Abuse Through an Extended Health Belief Model. SSRN ELECTRONIC JOURNAL 2017. [DOI: 10.2139/ssrn.3070823] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
125
|
Rohn E, Sabari G, Leshem G. Explaining small business InfoSec posture using social theories. INFORMATION AND COMPUTER SECURITY 2016. [DOI: 10.1108/ics-09-2015-0041] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This study aims to investigate information technology security practices of very small enterprises.
Design/methodology/approach
The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory.
Findings
Only one-third of all the controls examined were designed properly and operated as expected. About half of the controls were either ill-designed or did not operate as intended. The social comparison theory and the rare events bias theory explain managers’s reliance on small experience samples which in turn leads to erroneous comprehension of their business environment, which relates to information security.
Practical implications
This information is valuable to executive branch policy makers striving to reduce information security vulnerability on local and national levels and small business organizations providing information and advice to their members.
Originality/value
Information security surveys are usually over-optimistic and avoid self-incrimination, yielding results that are less accurate than field work. To obtain grounded facts, the authors used the field research approach to gather qualitative and quantitative data by physically visiting active organizations, interviewing managers and staff, observing processes and reviewing written materials such as policies, procedure and logs, in accordance to common practices of security audits.
Collapse
|
126
|
Bernik I, Prislan K. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation. PLoS One 2016; 11:e0163050. [PMID: 27655001 PMCID: PMC5031431 DOI: 10.1371/journal.pone.0163050] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/24/2016] [Accepted: 09/01/2016] [Indexed: 11/18/2022] Open
Abstract
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.
Collapse
Affiliation(s)
- Igor Bernik
- University of Maribor, Faculty of Criminal Justice and Security, Kotnikova 8, SI - 1000, Ljubljana, Slovenia
- * E-mail:
| | - Kaja Prislan
- University of Maribor, Faculty of Criminal Justice and Security, Kotnikova 8, SI - 1000, Ljubljana, Slovenia
| |
Collapse
|
127
|
Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing. SUSTAINABILITY 2016. [DOI: 10.3390/su8070638] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
128
|
Rocha Flores W, Ekstedt M. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput Secur 2016. [DOI: 10.1016/j.cose.2016.01.004] [Citation(s) in RCA: 46] [Impact Index Per Article: 5.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
129
|
Tsai HYS, Jiang M, Alhabash S, LaRose R, Rifon NJ, Cotten SR. Understanding online safety behaviors: A protection motivation theory perspective. Comput Secur 2016. [DOI: 10.1016/j.cose.2016.02.009] [Citation(s) in RCA: 140] [Impact Index Per Article: 15.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
130
|
Posey C, Roberts TL, Lowry PB. The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2015.1138374] [Citation(s) in RCA: 97] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
131
|
Information security management needs more holistic approach: A literature review. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2016. [DOI: 10.1016/j.ijinfomgt.2015.11.009] [Citation(s) in RCA: 208] [Impact Index Per Article: 23.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
132
|
Al-Janabi S, Al-Shourbaji I. A Study of Cyber Security Awareness in Educational Environment in the Middle East. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT 2016. [DOI: 10.1142/s0219649216500076] [Citation(s) in RCA: 41] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
Information security awareness can play an important role in facing cyber-attacks by intruders. The main goal of this paper is to analyse the information security awareness among academic staff, researchers, undergraduate students and employee within educational environments in the Middle East in an attempt to understand the level of awareness of information security, the associated risks and overall impact on the institutions. The results reveal that the participants do not have the requisite knowledge and understanding of the importance of information security principles and their practical application in their day-to-day work. This situation can however be corrected through comprehensive awareness and training programs as well as adopting all the necessary safety measures at all levels of the institution to ensure that the students, academic staff and employees are trustworthy, technology savvy and keep their data safe. Without such training programs and awareness, there will be negative consequences on IT systems and their application usage, as well as on users’ personal security now and in the future. From the weaknesses identified in this survey, some essential recommendations are put forward to remedy the situation.
Collapse
Affiliation(s)
- Samaher Al-Janabi
- Department of Information Networks, Faculty of Information Technology, University of Babylon, Babylon 00964, Iraq
| | - Ibrahim Al-Shourbaji
- Computer Network Department, Computer Science and Information System College, Jazan University, Jazan 82822-6649, Saudi Arabia
| |
Collapse
|
133
|
“Want to” Versus “Have to”: Intrinsic and Extrinsic Motivators as Predictors of Compliance Behavior Intention. HUMAN RESOURCE MANAGEMENT 2015. [DOI: 10.1002/hrm.21774] [Citation(s) in RCA: 27] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
|
134
|
Dysfunctional information system behaviors are not all created the same: Challenges to the generalizability of security-based research. INFORMATION & MANAGEMENT 2015. [DOI: 10.1016/j.im.2015.07.008] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
135
|
Kroenung J, Eckhardt A. The attitude cube—A three-dimensional model of situational factors in IS adoption and their impact on the attitude–behavior relationship. INFORMATION & MANAGEMENT 2015. [DOI: 10.1016/j.im.2015.05.002] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
|
136
|
Cantor DE, Morrow PC, Blackhurst J. An Examination of How Supervisors Influence Their Subordinates to Engage in Environmental Behaviors. DECISION SCIENCES 2015. [DOI: 10.1111/deci.12149] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Affiliation(s)
- David E. Cantor
- Department of Supply Chain and Information Systems, College of Business; Iowa State University; 2340 Gerdin Business Building Ames IA 50011
| | - Paula C. Morrow
- Department of Management, College of Business; Iowa State University; 3328 Gerdin Business Building Ames IA 50011
| | - Jennifer Blackhurst
- Department of Management Sciences, Tippie College of Business; University of Iowa; 21 East Market Street Iowa City Iowa 52242
| |
Collapse
|
137
|
|
138
|
Karlsson F, Åström J, Karlsson M. Information security culture – state-of-the-art review between 2000 and 2013. INFORMATION AND COMPUTER SECURITY 2015. [DOI: 10.1108/ics-05-2014-0033] [Citation(s) in RCA: 43] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
– The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about.
Design/methodology/approach
– Results are based on a literature review of information security culture research published between 2000 and 2013 (December).
Findings
– This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature.
Research limitations/implications
– Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research.
Practical implications
– Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated.
Originality/value
– Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security.
Collapse
|
139
|
Hu Q, West R, Smarandescu L. The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective. J MANAGE INFORM SYST 2015. [DOI: 10.1080/07421222.2014.1001255] [Citation(s) in RCA: 29] [Impact Index Per Article: 2.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
140
|
D'Arcy J, Herath T, Shoss MK. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. J MANAGE INFORM SYST 2014. [DOI: 10.2753/mis0742-1222310210] [Citation(s) in RCA: 216] [Impact Index Per Article: 19.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
141
|
Information security awareness and behavior: a theory-based literature review. MANAGEMENT RESEARCH REVIEW 2014. [DOI: 10.1108/mrr-04-2013-0085] [Citation(s) in RCA: 100] [Impact Index Per Article: 9.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
– This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature.
Design/methodology/approach
– This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories.
Findings
– The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees’ security behavior is presented.
Research limitations/implications
– Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum.
Practical implications
– This study presents an overview of determinants that have been proven to influence employees’ behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs.
Originality/value
– This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees’ security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out.
Collapse
|
142
|
D'Arcy J, Greene G. Security culture and the employment relationship as drivers of employees’ security compliance. ACTA ACUST UNITED AC 2014. [DOI: 10.1108/imcs-08-2013-0057] [Citation(s) in RCA: 70] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
– The purpose of this paper is to examine the influence of security-related and employment relationship factors on employees’ security compliance decisions. A major challenge for organizations is encouraging employee compliance with security policies, procedures and guidelines. Specifically, we predict that security culture, job satisfaction and perceived organizational support have a positive effect on employees’ security compliance intentions.
Design/methodology/approach
– This study used a survey approach for data collection. Data were collected using two online surveys that were administered at separate points in time.
Findings
– Our results provide empirical support for security culture as a driver of employees’ security compliance in the workplace. Another finding is that an employee’s feeling of job satisfaction influences his/her security compliance intention, although this relationship appears to be contingent on the employee’s position, tenure and industry. Surprisingly, we also found a negative relationship between perceived organizational support and security compliance intention.
Originality/value
– Our results provide one of the few empirical validations of security culture, and we recognize its multidimensional nature as conceptualized through top management commitment to security (TMCS), security communication and computer monitoring. We also extend security compliance research by considering the influence of employment relationship factors drawn from the organizational behavior literature.
Collapse
|
143
|
The effects of organizational culture and environmental pressures on IT project performance: A moderation perspective. INTERNATIONAL JOURNAL OF PROJECT MANAGEMENT 2014. [DOI: 10.1016/j.ijproman.2013.12.003] [Citation(s) in RCA: 38] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
|
144
|
Narain Singh A, Gupta M, Ojha A. Identifying factors of “organizational information security management”. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2014. [DOI: 10.1108/jeim-07-2013-0052] [Citation(s) in RCA: 33] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
– Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets. It is felt that technical solutions alone are not sufficient to address the information security challenge. It has been argued that organizations also need to consider the management aspects of information security. Consequently, literature, especially in the last decade, has witnessed various scholarly works in this direction. Therefore, a synthesis exercise is required to bring clarity on categorizing the issues of organizational information security management (ISM) to take the research forward. The purpose of this paper is to identify management factors that address organizational information security challenges.
Design/methodology/approach
– Using a mix method approach, the paper adopts the qualitative (keyword analysis and experts’ opinion) and quantitative (questionnaire survey) research routes. Exploratory factor analysis is conducted to find out the key factors of organizational ISM.
Findings
– The paper categorizes various organizational ISM functions into ten factors. Spanning across three levels (strategic, tactical and operational), these factors cover various management issues of organizational ISM.
Originality/value
– The paper takes the ISM literature forward by statistically validating the key management factors of organizational ISM. The study outcome should help to draw the attention of organizations toward the managerial challenges of organizational ISM.
Collapse
|
145
|
Rocha Flores W, Antonsen E, Ekstedt M. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Comput Secur 2014. [DOI: 10.1016/j.cose.2014.03.004] [Citation(s) in RCA: 40] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
146
|
Kajzer M, D'Arcy J, Crowell CR, Striegel A, Van Bruggen D. An exploratory investigation of message-person congruence in information security awareness campaigns. Comput Secur 2014. [DOI: 10.1016/j.cose.2014.03.003] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
147
|
Singh AN, Picot A, Kranz J, Gupta MP, Ojha A. Information Security Management (ISM) Practices: Lessons from Select Cases from India and Germany. ACTA ACUST UNITED AC 2013. [DOI: 10.1007/s40171-013-0047-4] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
148
|
Crossler RE, Johnston AC, Lowry PB, Hu Q, Warkentin M, Baskerville R. Future directions for behavioral information security research. Comput Secur 2013. [DOI: 10.1016/j.cose.2012.09.010] [Citation(s) in RCA: 340] [Impact Index Per Article: 28.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
149
|
Sommestad T, Hallberg J. A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance. SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS 2013. [DOI: 10.1007/978-3-642-39218-4_20] [Citation(s) in RCA: 11] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
|