2014
DOI: 10.1057/ejis.2012.59
|View full text |Cite
|
Sign up to set email alerts
|

Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations

Abstract: The information systems (IS) field continues to debate the relative importance of rigor and relevance in its research. While the pursuit of rigor in research is important, we argue that further effort is needed to improve practical relevance, not only in terms of topics, but also by ensuring contextual relevance. While content validity is often performed rigorously, validated survey instruments may still lack contextual relevance and be out of touch with practice. We argue that IS behavioral research can impro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
52
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
3

Relationship

1
8

Authors

Journals

citations
Cited by 92 publications
(56 citation statements)
references
References 54 publications
4
52
0
Order By: Relevance
“…One of the earliest definitions in the area of insecure behaviors is Parker's (1976) definition of the term computer abuse. Later, Straub (1990) introduced it to ISS, and this paper's first author might be to blame for introducing the terms information security policy violations and employees' noncompliance with information security procedures (Siponen & Vance, 2014). …”
Section: Metalevel Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the earliest definitions in the area of insecure behaviors is Parker's (1976) definition of the term computer abuse. Later, Straub (1990) introduced it to ISS, and this paper's first author might be to blame for introducing the terms information security policy violations and employees' noncompliance with information security procedures (Siponen & Vance, 2014). …”
Section: Metalevel Examplesmentioning
confidence: 99%
“…As a result, previous research put a premium on models in which the same reasons, such as fear of threat or sanctions, explain users' ISS behavior across all insecure behaviors (e.g., selecting a weak password, not locking a computer, etc.). Generic measures represent the most common method for measuring insecure behaviors in previous research (Siponen & Vance, 2014). These include evaluating responses to prompts, such as "I comply with the information security policies of my organization" (ibid).…”
Section: Metalevel Examplesmentioning
confidence: 99%
“…To enable ease of design without sacrificing rigor, we implemented our research design within a professional cloud environment to match our target population [43]. We empirically tested our research hypotheses using the data collected through a survey that included items for the constructs specified in the model.…”
Section: Samplementioning
confidence: 99%
“…Specifically, we know little of the relative importance of the various predictors of security policy compliance, as the results differ across studies and research contexts. Some authors have attributed these differences to the inconsistent measurement of the policy compliance construct (i.e., actual vs. intended compliance; general vs. behavior-specific compliance [39]) and we investigate this issue through moderation tests within our meta-analysis.…”
Section: Literature Reviewmentioning
confidence: 99%