Search results for "Information systems security"
showing 4 items of 4 documents
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective
2019
Practice-/policy-oriented abstract: Understanding why employees do or do not comply with information systems security (ISS) procedures is an imperative in today’s organizations whose futures often depend on how well they protect and harness information assets. We use a predominantly inductive approach to develop a theoretical understanding of how employees’ reasons for engaging to ISS behaviors (ISSBs) change over time, using ideas from dialectics as our scaffolding. Our dialectical view of this process suggests that explanations for engaging in different ISSBs change over time as individuals seek to balance contradictory demands. Furthermore, our view suggests that new experiences and ext…
Protection Motivation Theory in Information Systems Security Research
2021
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…
Information systems security issues in the context of developing countries
2018
This chapter explores the current state of information systems security (ISS) in developing countries and suggests a way forward. A systematic literature review is conducted applying the approach suggested in reference [1]. In total, 41 articles were evaluated, 17 of which were analysed as part of the review. The review shows that the proliferation of technology in developing countries is increasing; however, ISS risk is also increasing in tandem. The reasons are lack of robust infrastructure, security education and skilled manpower. The review also revealed that while most of the technologies created are for the organizations in the developed world, developing countries are blindly impleme…
Intervention Effect Rates as a Path to Research Relevance : Information Systems Security Example
2018
In the current information systems security (ISS) research, new theory contributions are especially valued. This research typically reflects the following formula: Suggest a new theory (or set of constructs) of ISS and show that it is empirically supported, then suggest another new theory (or set of constructs with some linkages) and show that it is empirically supported, and so on. Despite the merits of this approach, it leaves out many important scientific aspects. For example, after more than 30 years of ISS research, (1) we know little about the conditions and situations to which new theories (or constructs) do not apply; (2) we do not know which new theories are more effective than oth…