2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) 2007
DOI: 10.1109/hicss.2007.206
|View full text |Cite
|
Sign up to set email alerts
|

Employees' Behavior towards IS Security Policy Compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
262
3
1

Year Published

2007
2007
2016
2016

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 261 publications
(271 citation statements)
references
References 35 publications
5
262
3
1
Order By: Relevance
“…However, PMT has seldom been applied to individuals' risky use of the Internet and information technology, with exceptions including recent studies on computer users' decisions to employ virus protection (Lee et al, 2008) and to regularly back up work-related data (Boss and Galletta, 2008), employees' compliance with company security policies (Pahnila et al, 2007;Johnston and Warkentin, 2010), and the stress coping mechanisms for IT professionals (Tsai et al, 2007). Other recent studies have utilized some of the same health-related constructs modeled in PMT to help explain security consciousness in users (Ng et al, 2009).…”
Section: What Factors Influence An Individual To Post Personal Informmentioning
confidence: 99%
“…However, PMT has seldom been applied to individuals' risky use of the Internet and information technology, with exceptions including recent studies on computer users' decisions to employ virus protection (Lee et al, 2008) and to regularly back up work-related data (Boss and Galletta, 2008), employees' compliance with company security policies (Pahnila et al, 2007;Johnston and Warkentin, 2010), and the stress coping mechanisms for IT professionals (Tsai et al, 2007). Other recent studies have utilized some of the same health-related constructs modeled in PMT to help explain security consciousness in users (Ng et al, 2009).…”
Section: What Factors Influence An Individual To Post Personal Informmentioning
confidence: 99%
“…5 Anecdotal evidence suggests that the most effective way to protect online privacy is to combine education and training with the use of technology tools to promote the users' awareness. End-user awareness and training is an especially challenging area in that users vary widely in level of motivations, perceptions of threat severity, and computer self-efficacy [46,50]. Therefore, future research should investigate how to integrate user awareness and training with the design and deployment of privacy-enhancing technologies.…”
Section: Discussionmentioning
confidence: 99%
“…The effectiveness of rewards and sanctions depends on the satisfaction of the receiving individual [34]. For example, (we expect) a small monetary reward may motivate a poor but not a rich individual.…”
Section: Improve Intuitive Behavior Towards Security Threatsmentioning
confidence: 99%