2013
DOI: 10.25300/misq/2013/37.4.09
|View full text |Cite
|
Sign up to set email alerts
|

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

Abstract: Phase I. Discovering the new construct's domain space (i.e., the relevant associated behaviors within the environment encompassed by the proposed construct) (determine the key behaviors that best represent a construct, from the perspective of the theory-based literature, experts, and target participants for whom the construct is being defined) Step 1a. Behavioral elicitation through literature review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
172
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 159 publications
(176 citation statements)
references
References 109 publications
3
172
0
1
Order By: Relevance
“…Crossler, Johnston, Lowry, Hu, Warkentin, and Baskerville [6], and Posey, Roberts, Lowry, Bennett, and Courtney [36] have raised such methodological concerns citing that studies solely placing emphasis on improving security awareness among insiders cannot address the issues relating to insiders who engage in an act driven by malicious intentions. This is "because knowledge created from a focus on a single behavior or subset of behaviors does not necessarily generalize to the grand structure M a n u s c r i p t 4 of behaviors" [36, p.1190].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Crossler, Johnston, Lowry, Hu, Warkentin, and Baskerville [6], and Posey, Roberts, Lowry, Bennett, and Courtney [36] have raised such methodological concerns citing that studies solely placing emphasis on improving security awareness among insiders cannot address the issues relating to insiders who engage in an act driven by malicious intentions. This is "because knowledge created from a focus on a single behavior or subset of behaviors does not necessarily generalize to the grand structure M a n u s c r i p t 4 of behaviors" [36, p.1190].…”
Section: Introductionmentioning
confidence: 99%
“…Overall, this paper searches for differences in behavioral intentions and in the cause-effect relationships between these intentions and their predictor variables among different types of dysfunctional information system behaviors. This paper accordingly addresses the above methodological issues in the current studies on insider dysfunctional behaviors in information systems [e.g., 4,6,[36][37][38], allowing an examination of behavioral intentions and changes in the predictors of these intentions across different types of dysfunctional behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…Human factors play a crucial role in cybersecurity [60], and recent analyses show that employees are often the weakest link in an organization with regard to cybersecurity [61]. As a result, organizations are urged to consider investing in cybersecurity training as a top priority [62], and to encourage protection-motivated behaviors [63,64]. These recommendations mean nothing if organizations fail to understand the impacts of delays and fall into the trap of shorttermism.…”
Section: Complex Systems and Delays In Building Cybersecurity Capabilmentioning
confidence: 99%
“…This is within the notion and premise that without policies and regulations, an organisation can experience incidents of information leakages and breaches (Deng et al 2011). Thus, roles, responsibilities and accountabilities of information usage by employees should be well guided (Posey et al 2013). …”
Section: Protection and Breaches Of Personal Informationmentioning
confidence: 99%