2013
DOI: 10.2139/ssrn.2200590
|View full text |Cite
|
Sign up to set email alerts
|

A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…One example is a study by McCoy et al (2009), who were unable to establish a relationship between organisational culture and information security attitudes and behaviours. Goo et al (2013) on the other hand, used the climate concept, which strongly supported the view that "the information security climate has significant positive influence on the intention of the security policy compliance". Consequently, existing findings can be described as inconclusive at best.…”
Section: Research Questions Investigated In Information Security Culture Researchmentioning
confidence: 83%
See 1 more Smart Citation
“…One example is a study by McCoy et al (2009), who were unable to establish a relationship between organisational culture and information security attitudes and behaviours. Goo et al (2013) on the other hand, used the climate concept, which strongly supported the view that "the information security climate has significant positive influence on the intention of the security policy compliance". Consequently, existing findings can be described as inconclusive at best.…”
Section: Research Questions Investigated In Information Security Culture Researchmentioning
confidence: 83%
“…In relation to the second meta-question, two research topics dominate. The first refers to the relation between culture/organisational culture and information security (McCoy et al, 2009;Goo et al, 2013;Connolly and Lang, 2012). This category of papers sets out to test the basic assumption that culture affects information security in organisations.…”
Section: Research Questions Investigated In Information Security Culture Researchmentioning
confidence: 99%
“…Appropriate information security is needed to enhance the confidentiality, integrity and availability of data, helping to maintain the original form of information content without risk of modification or loss. Various disciplines involved in managing organizations and securing their information have shown intense interest in the field of information security management (Goo et al , 2013), effectively preventing security breaches and using up-to-date information management strategies to meet the latest information security standards. This paper focuses on information security management issues for human service organizations (HSOs) and presents an information security management framework to assist them in reducing the threat of information security breaches.…”
Section: Introductionmentioning
confidence: 99%
“…Other theories have only been occasionally tested. For example, tests of Neutralization Theory (Siponen and Vance, 2010; Barlow et al , 2013) and Social Control Theory (Lee et al , 2004; Goo et al , 2013) have been performed.…”
Section: Theory and Hypothesesmentioning
confidence: 99%
“…Some of these studies have also found links between information security policy compliance intentions and the norms expressed by friends (Jenkins and Durcikova, 2013), information security personnel (Siponen et al , 2010; Siponen et al , 2014), IT personnel (Ifinedo, 2012) or technical specialists (Herath and Rao, 2009). Furthermore, research by Goo et al (2013), McCoy et al (2009), Lowry et al (2014), Hu et al (2012), Finch et al (2003), Chipperfield and Furnell (2010), Furnell and Thomson (2009) and Sommestad (2015) have established or proposed various links between individuals’ perception of their organization and their perceptions related to information security.…”
Section: Theory and Hypothesesmentioning
confidence: 99%