Security-related behavior in using information systems in the workplace: A review and synthesis

被引:83
|
作者
Guo, Ken H. [1 ]
机构
[1] Western New England Univ, Coll Business, Springfield, MA 01119 USA
关键词
Information security; Security-related behavior; Security assurance behavior; Security risk-taking behavior; Security damaging behavior; Security violation; POLICY COMPLIANCE; PROTECTION MOTIVATION; COMPUTER ABUSE; DETERRENCE; ORGANIZATIONS; ETHICS; MISUSE; MODEL; WORK;
D O I
10.1016/j.cose.2012.10.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security-related behavior in the workplace has recently drawn much attention from scholars in the information systems literature. Many studies, however, have reported inconsistent and sometimes contradictory results about the effects of some key factors such as sanctions. We argue that one of the reasons causing the inconsistent findings is the divergent conceptualizations of security-related behavior. In this paper, we conducted an extensive review of the divergent concepts. Many of the concepts overlap with each other on some dimensions and yet are different on others. By delineating and synthesizing the differences, we proposed a framework for conceptualizing security-related behavior. The framework can facilitate the development of consistent and comparable terms and concepts in future studies. Implications for research are also discussed. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:242 / 251
页数:10
相关论文
共 50 条
  • [1] Security-related concerns with geographic information systems and geographic mapping
    Forcht, Karen A.
    Information Management and Computer Security, 2000, 8 (05): : 218 - 221
  • [2] Security views - Update on information security-related legislation
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (07) : 510 - 511
  • [3] Information Security Maintenance Issues for Big Security-Related Data
    Miloslavskaya, Natalia
    Senatorov, Mikhail
    Tolstoy, Alexander
    Zapechnikov, Sergey
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 361 - 366
  • [4] SECURITY-RELATED BEHAVIOR OF PC USERS IN ORGANIZATIONS
    FRANK, J
    SHAMIR, B
    BRIGGS, W
    INFORMATION & MANAGEMENT, 1991, 21 (03) : 127 - 135
  • [5] Twitter Sentiment Analysis for Security-Related Information Gathering
    Jurek, Anna
    Bi, Yaxin
    Mulvenna, Maurice
    2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC), 2014, : 48 - 55
  • [6] Information security-related bills move through Congress
    不详
    COMPUTERS & SECURITY, 2006, 25 (02) : 87 - 87
  • [7] Impact of Security-related Stress and Affective Distress on Information Security Policy Compliance
    Bao Quoc Duong
    AMCIS 2020 PROCEEDINGS, 2020,
  • [8] Modeling of network security-related behaviours using NVML
    Shahriari, HR
    Jalili, R
    INMIC 2004: 8th International Multitopic Conference, Proceedings, 2004, : 506 - 511
  • [9] Eyes wide open: The role of situational information security awareness for security-related behaviour
    Jaeger, Lennart
    Eckhardt, Andreas
    INFORMATION SYSTEMS JOURNAL, 2021, 31 (03) : 429 - 472
  • [10] Protecting private security-related information from disclosure by government agencies
    Conrad, JW
    ADMINISTRATIVE LAW REVIEW, 2005, 57 (03) : 715 - 755