Violators versus non-violators of information security measures in organizations-A study of distinguishing factors
المؤلف | Khan, Habib Ullah |
المؤلف | AlShare, Khalid A. |
تاريخ الإتاحة | 2020-05-15T00:15:04Z |
تاريخ النشر | 2019-02-17 |
اسم المنشور | Journal of Organizational Computing and Electronic Commerce |
المصدر | Scopus |
المعرّف | http://dx.doi.org/10.1080/10919392.2019.1552743 |
الاقتباس | Khan, H. U., & AlShare, K. A. (2019). Violators versus non-violators of information security measures in organizations—A study of distinguishing factors. Journal of Organizational Computing and Electronic Commerce, 29(1), 4-23. |
الرقم المعياري الدولي للكتاب | 1091-9392 |
الملخص | The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, theory of planned behavior, theory of reasoned action, protection motivation theory, and social cognitive theory. To examine these factors, the data are gathered through an online study conducted in a Midwestern University, USA. The data are collected using questionnaires, and after scrutiny, 195 questionnaires are selected for final analysis. This data are analyzed using second-level statistical techniques, such as chi-square analysis and ANOVA. Results reveal that violators and non-violators of information security measures differ significantly with respect to many factors. These factors include perceived privacy, subjective norms, perceived information security policy (ISP) scope, perceived severity of penalty, perceived celerity of penalty, management support, organizational security culture, and perceived organizational IT capability. The non-significant factors are trust and work load. Implications for practitioners and researchers are provided. 2019, 2019 Taylor & Francis Group, LLC. |
اللغة | en |
الناشر | Taylor and Francis Inc. |
الموضوع | Information security (IS) information security policy (ISP) non-violators organizational IT capability violators |
النوع | Article |
الصفحات | 4-23 |
رقم العدد | 1 |
رقم المجلد | 29 |
ESSN | 1532-7744 |
الملفات في هذه التسجيلة
هذه التسجيلة تظهر في المجموعات التالية
-
المحاسبة ونظم المعلومات [527 items ]