2016 4th International Conference on Information and Communication Technology (ICoICT) 2016
DOI: 10.1109/icoict.2016.7571929
|View full text |Cite
|
Sign up to set email alerts
|

A typology of employees' information security behaviour

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…In the knowing-doing mode, employees know the rules, have the necessary security skills and comply with the rules (Alfawaz et al, 2010). Ahmad et al (2016) group employees into four types based on whether or not they know the security rules and whether or not they comply with the information security rules. They classify these rules as discerning, obedient, rebellious and oblivious employees.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…In the knowing-doing mode, employees know the rules, have the necessary security skills and comply with the rules (Alfawaz et al, 2010). Ahmad et al (2016) group employees into four types based on whether or not they know the security rules and whether or not they comply with the information security rules. They classify these rules as discerning, obedient, rebellious and oblivious employees.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Discerning individuals conform to the information security rules because they have the necessary knowledge; some employees conform to the information security rules not because they have the knowledge but because they follow organisational rules just because they are there; other employees choose not to conform to information security rules despite having the knowledge; and others still violate information security because they do not have the security knowledge (Ahmad et al, 2016). Alfawaz et al (2010) and Ahmad et al (2016) propose a classification of employees' information security behaviour that also explain why employees fail to comply with organisational ISPs. They postulate that employees fail to comply because they are ignorant of the regulations, they choose not to or they are not competent owing to lack of security knowledge.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Accordingly, since technical solutions are insufficient to address the challenges of information security [19], everincreasing security needs have expanded the attention of researchers to research of the role of management in information security management [2]. Effective information security management requires a combination of technical and managerial controls for information risk management [2] with an emphasis on people as an essential element of information security [19], [20], [21] where, despite sophisticated technologies and technical measures, employee inattention may continue to jeopardize the organization's security which depends on its users [8], [22], [23].…”
Section: Information Security In Organizationsmentioning
confidence: 99%
“…While education involves learning basic concepts and theoretical concepts from work materials, the training serves to provide employees with skills and knowledge related to information security that are specific to their roles and responsibilities through the use of seminars and workshops. On the other hand, raising awareness serves for focusing employee attention on information security in order to ensure their understanding of their roles and responsibilities in the protection of information [27] that can easily be overlooked if information security is considered as solely IT department's responsibility [23]. The greatest emphasis from these three components is awareness raising, which functions as a tool to familiarize employees with the understanding and acceptance of the information security policy developed by the organization [12].…”
Section: Information Security Education Training and Awarenessmentioning
confidence: 99%