The Library
Information security conscious care behaviour formation in organizations
Tools
Sohrabi Safa, Nader , Sookhak, Mehdi, Von Solms, Rossouw, Furnell, Steven, Ghani, Norjihan Abdul and Herawan, Tutut (2015) Information security conscious care behaviour formation in organizations. Computers & Security, 53 . pp. 65-78. doi:10.1016/j.cose.2015.05.012 ISSN 0167-4048.
Research output not available from this repository.
Request-a-Copy directly from author or use local Library Get it For Me service.
Official URL: http://dx.doi.org/10.1016/j.cose.2015.05.012
Abstract
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which many businesses simply cannot operate. However, information security for both private and business aspects is important. Experts believe that technology cannot solely guarantee a secure environment for information. Users' behaviour should be considered as an important factor in this domain. The Internet is a huge network with great potential for information security breaches. Hackers use different methods to change confidentiality, integrity, and the availability of information in line with their benefits, while users intentionally or through negligence are a great threat for information security. Sharing their account information, downloading any software from the Internet, writing passwords on sticky paper, and using social security numbers as a username or password are examples of their mistakes. Users' negligence, ignorance, lack of awareness, mischievous, apathy and resistance are usually the reasons for security breaches. Users' poor information security behaviour is the main problem in this domain and the presented model endeavours to reduce the risk of users' behaviour in this realm. The results of structural equation modelling (SEM) showed that Information Security Awareness, Information Security Organization Policy, Information Security Experience and Involvement, Attitude towards information security, Subjective Norms, Threat Appraisal, and Information Security Self-efficacy have a positive effect on users' behaviour. However, Perceived Behavioural Control does not affect their behaviour significantly. The Protection Motivation Theory and Theory of Planned Behaviour were applied as the backbone of the research model.
Item Type: | Journal Article | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | H Social Sciences > HD Industries. Land use. Labor H Social Sciences > HF Commerce Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software T Technology > T Technology (General) T Technology > TK Electrical engineering. Electronics Nuclear engineering |
||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||||||||
Library of Congress Subject Headings (LCSH): | Computer security, Computer networks--Security measures, Information resources management--Security measures, Data protection, Information technology--Security measures, Hacking | ||||||||||
Journal or Publication Title: | Computers & Security | ||||||||||
Publisher: | Elsevier Advanced Technology | ||||||||||
ISSN: | 0167-4048 | ||||||||||
Official Date: | September 2015 | ||||||||||
Dates: |
|
||||||||||
Volume: | 53 | ||||||||||
Page Range: | pp. 65-78 | ||||||||||
DOI: | 10.1016/j.cose.2015.05.012 | ||||||||||
Status: | Peer Reviewed | ||||||||||
Publication Status: | Published | ||||||||||
Access rights to Published version: | Restricted or Subscription Access |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |