Featured Talk: Measuring Secure Behavior: A Research Commentary
@inproceedings{Warkentin2012FeaturedTM, title={Featured Talk: Measuring Secure Behavior: A Research Commentary}, author={Merrill Warkentin and Detmar W. Straub and Kalana Malimage}, year={2012} }
HE expansion of and reliance on highly-interconnected information systems has increased the exposure of organizations to various threats. Though some security threats are technical or the result of natural or manmade disasters, many are anthropogenic, including errors and omissions by employees, malicious acts by employees, and the acts of external factors such as competitors with malicious intent, hackers, and others [21]. This increased vulnerability in the threat landscape has caused most…
41 Citations
A theory-based review of information security behavior in the organization and home context
- Computer Science2016 International Conference on Advances in Computing and Communication Engineering (ICACCE)
- 2016
It is found that limited research attention has been given to information security behavior in the home context, indicating the dominant theoretical approaches used to date.
Future directions for behavioral information security research
- Computer Science, BusinessComput. Secur.
- 2013
The Impact of Time Pressure on Human Cybersecurity Behavior: An Integrative Framework
- Computer Science2018 26th International Conference on Systems Engineering (ICSEng)
- 2018
A conceptual framework consisting of contexts, psychological constructs, and boundary conditions pertaining to the role time pressure plays on HCS behavior is presented and will serve as a guideline for future studies exploring different aspects of time pressure in cybersecurity contexts and also to identify potential countermeasures for the detrimental impact of time Pressure.
Developing a Viral Artifact to Improve Employees’ Security Behavior
- Computer Science
- 2014
The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.
Managers’ and Employees’ Differing Responses to Security Approaches
- BusinessJ. Comput. Inf. Syst.
- 2019
The results suggest that participation in the ISP decision-making process might prove to be a more effective approach to motivate lower-level employees toward compliance and that enhancing the meaningfulness of policy compliance could be the preferred method among higher levels of management.
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
- Computer ScienceComput. Secur.
- 2017
The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
- Computer ScienceJ. Manag. Inf. Syst.
- 2015
It is shown in detail how organizational commitment is the mechanism through which organizational security threats become personally relevant to insiders and how SETA efforts influence many PMT-based components.
An ethnographic study to assess the enactment of information security culture in a retail store
- Computer Science2015 World Congress on Internet Security (WorldCIS)
- 2015
An ethnographic investigation into the security culture of a single retail store that is part of a large nationwide organization in the United Kingdom surprisingly revealed poor security culture, despite the organization as a whole seemingly following good practice with respect to education and policy.
High-Risk Deviant Decisions: Does Neutralization Still Play a Role?
- Computer ScienceJ. Assoc. Inf. Syst.
- 2021
The results show that sanctions play an important role in reducing employees’ intentions to violate policy but that, even under extreme boundary conditions, employees might seek to rationalize their unethical behavior by denying responsibility for their actions through, for example, arguing that their supervisors pressured them into performing the violations.
References
SHOWING 1-10 OF 39 REFERENCES
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
- Computer ScienceInf. Syst. Res.
- 2009
An extended deterrence theory model is presented that combines work from criminology, social psychology, and information systems and suggests that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention.
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
- Computer ScienceDecis. Support Syst.
- 2009
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
- Computer ScienceMIS Q.
- 2010
This article shows that neutralization theory, a theory prominent in Criminology but not yet applied in the context of IS, provides a compelling explanation for IS security policy violations and offers new insight into how employees rationalize this behavior.
Protection motivation and deterrence: a framework for security policy compliance in organisations
- Business, Computer ScienceEur. J. Inf. Syst.
- 2009
An Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todd's Decomposed Theory of Planned Behaviour is developed and it is found that employees in the sample underestimate the probability of security breaches.
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
- Computer Science, BusinessJ. Manag. Inf. Syst.
- 2011
This study proposes and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work, and suggests that utilitarian outcomes, normative outcomes, and self-identity outcomes are key determinants of end user intentions to engage in NMSVs.
Effective IS Security: An Empirical Study
- Computer ScienceInf. Syst. Res.
- 1990
Investigation of whether a management decision to invest in IS security results in more effective control of computer abuse indicates that security countermeasures that include deterrent administrative procedures and preventive security software will result in significantly lower computer abuse.
Fear Appeals and Information Security Behaviors: An Empirical Study
- Computer Science, BusinessMIS Q.
- 2010
Investigation of the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats suggests that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users.
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- BusinessMIS Q.
- 2010
The results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply, and the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance is shed.
Beyond Deterrence: An Expanded View of Employee Computer Abuse
- Computer ScienceMIS Q.
- 2013
The Straub and Welke (1998) security action cycle framework is extended and three areas worthy of empirical investigation are proposed--techniques of neutralization, expressive/instrumental criminal motivations, and disgruntlement as a result of perceptions of organizational injustice--and questions for future research in these areas are proposed.
Threats to Information Systems: Today's Reality, Yesterday's Understanding
- BusinessMIS Q.
- 1992
A study investigating MIS executives' concern about a variety of threats found computer viruses to be a particular concern, highlighting a gap between the use of modern technology and the understanding of the security implications inherent in its use.