2019
DOI: 10.1002/spy2.66
|View full text |Cite
|
Sign up to set email alerts
|

End user nonmalicious, counterproductive computer security behaviors: concept, development, and validation of an instrument

Abstract: Employees' engagement in nonmalicious, counterproductive computer security behaviors (CCSB) poses a threat to organizations' information systems (IS) resources and assets. In order to understand CCSB, there is a need to propose theoretical foundations to research the phenomenon and to offer useful tools to help organizations assess such behaviors in their particular contexts. Relevant instruments that systematically measure or assess workers' participation in CCSB remain underdeveloped. This study proposes an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 53 publications
(88 reference statements)
0
4
0
Order By: Relevance
“…Similarly, SETA programs' availability and their impact on reducing workers' involvement in UCP might be contextual. Thus, where an individual is located might have a bearing on his or her ability to deal with UCP and related IS security issues (e.g., Bellman et al, 2004;Ifinedo, 2019;KNOWBE4, 2019;The African Report, 2021;Ameen et al, 2021).…”
Section: Theoretical Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Similarly, SETA programs' availability and their impact on reducing workers' involvement in UCP might be contextual. Thus, where an individual is located might have a bearing on his or her ability to deal with UCP and related IS security issues (e.g., Bellman et al, 2004;Ifinedo, 2019;KNOWBE4, 2019;The African Report, 2021;Ameen et al, 2021).…”
Section: Theoretical Contributionsmentioning
confidence: 99%
“…Recent research has focused attention on cyber-related end-user IS security behaviors by developing taxonomies for categorizing such behaviors (Egelman & Peer, 2015;Lee et al, 2008;Posey et al, 2013;Ifinedo, 2019;Vishwanath et al, 2020). For example, Posey et al (2013) proposed a scheme classifying IS protection-motivated behaviors, and Egelman and Peer (2015) developed a security behavior intentions scale.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations