Search results for "Is security"

showing 5 items of 5 documents

Protection Motivation Theory in Information Systems Security Research

2021

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…

Future studiesKnowledge managementthreat messageliterature reviewkäyttäjätComputer Networks and CommunicationsuhatInformation systems securityasenteet02 engineering and technologyProtection Motivation TheoryManagement Information Systemssuojelumotivaaatioteoria020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringIs securityInformation systemRoad maptietoturvasuojelutietojärjestelmätbehavioral IS securitybusiness.industry05 social sciencesInformation securityIS security threatFear appealProtection motivation theoryfear appeal050211 marketingbusinessACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct

IS Security Policy Violations

2012

Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insig…

IS security policiesCritical security studiesStrategy and ManagementRational choice theoryIS security complianceCommitdeterrence theoryComputer Science ApplicationsTest (assessment)IS securityHuman-Computer InteractionEmpirical researchInformation security standardsrational choice theoryEconomicsIs securitySanctionsPositive economicsSocial psychologyJournal of Organizational and End User Computing
researchProduct

Dual-process Accounts of Reasoning in User's Information System Risky Behavior

2016

End user of information system (IS) is the weakest point in terms of IS security. A variety of approaches are developed to convince end users to avoid IS risky behaviors. However, they do not always work. We would like to argue that one of the reasons is that previous studies focused on System 2 thinking (analytic, deliberate, rule-governed and effortful process) and overlooked the factors that can influence people who are using System 1 thinking (automatic, effortless, associative and intuitive process). In this study, we propose a model that integrates influential factors for both modes of thinking together. Moderators of such relationships will be discussed as well. A laboratory experime…

IS securitysystem 1 thinkingdual-process theorysystem 2 thinking
researchProduct

Prosessiteoreettinen näkökulma, joka selittää henkilökohtaisen tietokoneen käyttöön liittyvää tietoturvakäyttäytymisen muutosta

2016

IS security behavior has become a mainstream topic in information systems. Extent research is dominated with the viewpoint for discovery of generic and stable predictors. The viewpoint rests on the implicit assumption that information security behavior can be explained by discovering these factors. The best know examples are IS security behavior models grounded upon Protection Motivation Theory (PMT) and the Deterrence Theory (DT). The success of this perspective hinges on the question as to what extend the IS security behavior and the reasons for it, are constant from time to time and from one specific security situation to another. The viewpoint is successful if computer users have built …

motivaatiosubjective construction of realitytarpeetIS security practicesprosessiteoriasubjektiivisuustietoturvakäyttäytyminenIS securitymotivestunteetkokemuksetmotivaatiopsykologiatietoturvakäyttäytyminenIS security behavior
researchProduct

User expectations, use experiences and continued adoption of a mobile secure communication application

2018

The importance of secure communication between employees in enterprises and governmental organizations as well as technologies to support that has increased tremendously over the past years. This study examines the user expectations before and the use experiences during the implementation phase of a mobile secure communication application together with expectation–confirmation and its influence on continued adoption. The study is explorative in nature and empirically based on thematic analysis of qualitative data collected from pilot users of a mobile secure communication application who work in a governmental organization in Finland. The theoretical basis of the study draws from two well-e…

turvallisuusturvallisuusviestintäsecure communicationadoptiosecurityexpectation - confirmation theorymobile applicationIS securityuse experienceunified theory of acceptance and use of technologyyksityisyysmobiilisovelluksetuser expectationskäyttäjäkokemusimplementationomaksuminenkäyttöönotto
researchProduct