Search results for "Information security behavior"

showing 2 items of 2 documents

Toward a stage theory of the development of employees’ information security behavior

2020

Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such models cannot explain a case where the reasons for ISB change. However, the underlying reasons and motives for users’ ISB are not static but may change over time. To understand the change in reasoning between different antecedents, we examine stage theorizing in other fields and develop the requirements for an emergent theory of the development of employees’ ISB: (1) the content of stages based on the stage elements and their stage-specific attributes; (2) the stage-independent element explaini…

organisaatiokäyttäytymineninformaatiokäyttäytyminenStage theoryoppiminenInformation securitytietoturvapolitiikkaLearningCompliance with information security policiesInformation security behaviortietoturva
researchProduct

Exploring determinants of different information security behaviors

2016

Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Offense-to-Self Theory (SOS), to better understand information security behavior (ISB). In addition, more commonly used constructs from Deterrence theory (DT) and Protection Motivation Theory (PMT) were used to explain ISB. This study also investigated several behaviors separately to evaluate the generalizability of the behavioral determinants. Methods: Four ISBs, namely general ISP compliance (ISP), not copying sensitive information to the unsecured USB drive (USB), locking or logging out from the computer (LOG), and not writing down passwords (PSW). Formal and informal sanctions from DT, thre…

suojautuminenDeterrence TheoryInformation security behaviorStress-as-Offense-to-Self TheorytietoturvaProtection Motivation Theory
researchProduct