Proceedings of the 50th Hawaii International Conference on System Sciences (2017) 2017
DOI: 10.24251/hicss.2017.605
|View full text |Cite
|
Sign up to set email alerts
|

The Assumptions and Profiles Behind IT Security Behavior

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 20 publications
(26 reference statements)
0
3
0
Order By: Relevance
“…Continuing in Figure 3, participant observation and passive observation were only used in four studies each; given this low frequency it is not possible to identify any patterns in terms of how they have been used. Finally, we found a small number of studies that used ethnography (Niemimaa, 2016; Niemimaa and Niemimaa, 2017), action research (Lopes and Oliveira, 2015b; Lopes and Oliveira, 2015c; Lopes and Oliveira, 2016), grounded theory (Knapp et al , 2009; Balozian and Leidner, 2016), experiment (SanNicolas-Rocca et al , 2014), simulation (Doherty and Fulford, 2006), consultancy (Talbot and Woodward, 2009) and design science (Kolkowska et al , 2017). For example, in the last study, design science was used to develop a method for analysing reasons behind employees’ compliance and non-compliance.…”
Section: Resultsmentioning
confidence: 99%
“…Continuing in Figure 3, participant observation and passive observation were only used in four studies each; given this low frequency it is not possible to identify any patterns in terms of how they have been used. Finally, we found a small number of studies that used ethnography (Niemimaa, 2016; Niemimaa and Niemimaa, 2017), action research (Lopes and Oliveira, 2015b; Lopes and Oliveira, 2015c; Lopes and Oliveira, 2016), grounded theory (Knapp et al , 2009; Balozian and Leidner, 2016), experiment (SanNicolas-Rocca et al , 2014), simulation (Doherty and Fulford, 2006), consultancy (Talbot and Woodward, 2009) and design science (Kolkowska et al , 2017). For example, in the last study, design science was used to develop a method for analysing reasons behind employees’ compliance and non-compliance.…”
Section: Resultsmentioning
confidence: 99%
“…In order to update the literature review of Balozian and Leidner (2017), we searched the literature from 2015 to 2019 inclusive. We surveyed all the articles on IS policy compliance in the Senior Scholars' basket eight of IS journals.…”
Section: Literature Review and Hypothesis Developmentmentioning
confidence: 99%
“…We supplemented our search by scanning the references of recent literature review papers on ISS compliance (Cram et al , 2019; Moody et al , 2018). We found 28 relevant ISS papers published between 2015 and 2019 inclusive (Appendix B), which we analyzed according to the six comprehensive constructs of ISS found in the building blocks of ISS theory of Balozian and Leidner (2017).…”
Section: Literature Review and Hypothesis Developmentmentioning
confidence: 99%