2016
DOI: 10.1108/ics-04-2016-0029
|View full text |Cite
|
Sign up to set email alerts
|

Theorising on risk homeostasis in the context of information security behaviour

Abstract: Purpose The purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security. Design/methodology/approach The discussion is mainly based on a literature survey backed up by illustrative empirical examples. Findings Risk homeostasis in the context of information security is an under-explored topic. The principles, assumptions and methodology of a risk homeostasis framework offer new insights and knowledge to explain and p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 61 publications
0
11
0
Order By: Relevance
“…Involvement theory was introduced by Astin (1999) to understudy factors in the college environment that affected students’ persistence in college and has been widely adopted by previous researchers in psychological and management research. Previous researchers have examined the role of involvement features related to ISP compliance including security knowledge sharing, collaboration, intervention and experience (Safa et al , 2016; Kearney and Kruger, 2016). Astin (1999) described quantitative and qualitative features of Involvement theory.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Involvement theory was introduced by Astin (1999) to understudy factors in the college environment that affected students’ persistence in college and has been widely adopted by previous researchers in psychological and management research. Previous researchers have examined the role of involvement features related to ISP compliance including security knowledge sharing, collaboration, intervention and experience (Safa et al , 2016; Kearney and Kruger, 2016). Astin (1999) described quantitative and qualitative features of Involvement theory.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…RHT has also been adapted in several security-related studies. Kearney and Kruger (2016) claimed that RHT can be leveraged to extend knowledge and insights into contradictory human behaviour.…”
Section: Rht In Information Securitymentioning
confidence: 99%
“…Many theories and models have been developed to study behaviour in various situations. Kearney and Kruger (2016) summarise the most prevalent theories as the following: the theory of reasoned action (TRA); the theory of planned behaviour (TPB); the general deterrence theory; and the protection motivation theory. Of the aforementioned, TPB (which is an extension of TRA) draws on the attitude of an individual to predict the intention that the individual has to perform a specific behaviour (Ifinedo, 2012;Bulgurcu et al, 2010).…”
Section: Theoretical Framework For Information Security Behaviourmentioning
confidence: 99%
“…Frangopoulos et al (2014) mention some common issues pertaining to bias when respondents answer questionnaires -which is a common data collection tool and also used in this studythat could have a negative impact on the subject being measured. Social desirability is a bias that is driven by respondents having a pre-conceived notion of the "correct" or "expected" answer (Kearney and Kruger, 2016;Fisher, 1993). The answers given are not a reflection of the truth or status quo, but rather a version of events that reflects actions that are deemed socially acceptable.…”
mentioning
confidence: 99%