The Library
Information security collaboration formation in organisations
Tools
Sohrabi Safa, Nader , Maple, Carsten, Watson, Tim and Furnell, Steven (2018) Information security collaboration formation in organisations. IET Information Security, 12 (3). 238. doi:10.1049/iet-ifs.2017.0257 ISSN 1751-8709.
|
PDF
WRAP-information-security-collaboration-formation-organisations-Sohrabi-Safa-2017.pdf - Accepted Version - Requires a PDF viewer. Download (1424Kb) | Preview |
Official URL: https://doi.org/10.1049/iet-ifs.2017.0257
Abstract
Collaboration between employees in the domain of information security efficiently mitigates the effect of information security attacks on organisations. Collaboration means working together to do or to fulfil a shared goal, the target of which in this paper is the protection of the information assets in organisations. Information Security Collaboration (ISC) aims to aggregate the employees’ contribution against information security threats. This study clarifies how ISC is to be developed and how it helps to reduce the effect of attacks. The socialisation of collaboration in the domain of information security applies two essential theories: Social Bond Theory (SBT) and the Theory of Planned Behaviour (TPB). The results of the data analysis revealed that personal norms, involvement, and commitment significantly influence the employees’ attitude towards ISC intention. However, contrary to our expectation, attachment does not influence the attitude of employees towards ISC. In addition, attitudes towards ISC, perceived behavioural control, and personal norms significantly affect the intention towards ISC. The findings also show that the intention for ISC and organisational support positively influence ISC, but that trust does not significantly affect ISC behaviour.
Item Type: | Journal Article | ||||||||
---|---|---|---|---|---|---|---|---|---|
Subjects: | B Philosophy. Psychology. Religion > BF Psychology H Social Sciences > HD Industries. Land use. Labor H Social Sciences > HF Commerce Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software |
||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||||||
Library of Congress Subject Headings (LCSH): | Computer security, Management information systems--Security measures, Employees--Training of, Business enterprises--Computer networks--Security measures., Organizational commitment , Employee loyalty | ||||||||
Journal or Publication Title: | IET Information Security | ||||||||
Publisher: | The Institution of Engineering and Technology | ||||||||
ISSN: | 1751-8709 | ||||||||
Official Date: | 2018 | ||||||||
Dates: |
|
||||||||
Volume: | 12 | ||||||||
Number: | 3 | ||||||||
Article Number: | 238 | ||||||||
DOI: | 10.1049/iet-ifs.2017.0257 | ||||||||
Status: | Peer Reviewed | ||||||||
Publication Status: | Published | ||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||
Date of first compliant deposit: | 14 December 2017 | ||||||||
Date of first compliant Open Access: | 15 December 2017 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year