Computing Handbook, Third Edition 2014
DOI: 10.1201/b16768-62
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral Information Security Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 74 publications
0
3
0
Order By: Relevance
“…Behavioural InfoSec researchers may apply SNA methods to investigate the impacts of networks on various InfoSec perceptions and behaviours provided by theories in the field. The literature reviews conducted by Padayachee (2012), Sommestad et al (2014) and Warkentin and Mutchler (2014) have identified theoretical variables of prominent theories such as protection motivation theory (Rogers, 1975), theory of planned behaviour (Ajzen, 2011) and general deterrence theory (Straub & Welke, 1998); some of these variables have been consistently found to motivate InfoSec compliance and deter potential InfoSec violations. Researchers can perform SNA to evaluate the impacts of employees' interactions on the important drivers of InfoSec compliance, such as attitude toward InfoSec, subjective norms, perceptions of cyber-threats and severity of InfoSec sanctions.…”
Section: Methodological Contributions To Infosec Researchmentioning
confidence: 99%
“…Behavioural InfoSec researchers may apply SNA methods to investigate the impacts of networks on various InfoSec perceptions and behaviours provided by theories in the field. The literature reviews conducted by Padayachee (2012), Sommestad et al (2014) and Warkentin and Mutchler (2014) have identified theoretical variables of prominent theories such as protection motivation theory (Rogers, 1975), theory of planned behaviour (Ajzen, 2011) and general deterrence theory (Straub & Welke, 1998); some of these variables have been consistently found to motivate InfoSec compliance and deter potential InfoSec violations. Researchers can perform SNA to evaluate the impacts of employees' interactions on the important drivers of InfoSec compliance, such as attitude toward InfoSec, subjective norms, perceptions of cyber-threats and severity of InfoSec sanctions.…”
Section: Methodological Contributions To Infosec Researchmentioning
confidence: 99%
“…This construct intends to explain employees' perceptions concerning organisational measures set in place to harmonise productivity levels with essential Information Security Compliance efforts. At the base of the INT construct lies the pursuit of exploring the knowledge about how the collective endeavors and interactions within an organization mold and shape individual behavioral intentions geared towards compliance, as clearly stated in Warkentin and Mutchler (2022), as well in Duzenci et al (2023), and defined in the outline of perspective directions for research in Crossler et al (2013).…”
Section: Construct Intmentioning
confidence: 99%
“…Technologies and controls surround and protect the organization's systems from external threats (Cavusoglu et al, 2009). Within the protective walls, employee actions represent potential threats that are often underestimated and at times overlooked (Warkentin and Mutchler, 2014). Because employees possess intimate knowledge of the organization's processes and have access rights to the organization's systems, they are uniquely capable of effecting harm to the organization through their actions (Im and Baskerville, 2005).…”
Section: Introductionmentioning
confidence: 99%