Security-related behavior in using information systems in the workplace: A review and synthesis

被引:83
|
作者
Guo, Ken H. [1 ]
机构
[1] Western New England Univ, Coll Business, Springfield, MA 01119 USA
关键词
Information security; Security-related behavior; Security assurance behavior; Security risk-taking behavior; Security damaging behavior; Security violation; POLICY COMPLIANCE; PROTECTION MOTIVATION; COMPUTER ABUSE; DETERRENCE; ORGANIZATIONS; ETHICS; MISUSE; MODEL; WORK;
D O I
10.1016/j.cose.2012.10.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security-related behavior in the workplace has recently drawn much attention from scholars in the information systems literature. Many studies, however, have reported inconsistent and sometimes contradictory results about the effects of some key factors such as sanctions. We argue that one of the reasons causing the inconsistent findings is the divergent conceptualizations of security-related behavior. In this paper, we conducted an extensive review of the divergent concepts. Many of the concepts overlap with each other on some dimensions and yet are different on others. By delineating and synthesizing the differences, we proposed a framework for conceptualizing security-related behavior. The framework can facilitate the development of consistent and comparable terms and concepts in future studies. Implications for research are also discussed. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:242 / 251
页数:10
相关论文
共 50 条
  • [41] An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior
    Wang, Jingguo
    Xiao, Nan
    Rao, H. Raghav
    INFORMATION SYSTEMS RESEARCH, 2015, 26 (03) : 619 - 633
  • [42] Information systems security job advertisement analysis: Skills review and implications for information systems curriculum
    Brooks, Nita G.
    Greer, Timothy H.
    Morris, Steven A.
    JOURNAL OF EDUCATION FOR BUSINESS, 2018, 93 (05) : 213 - 221
  • [43] Security Management in Health Care Information Systems A literature review
    Smaradottir, Berglind Fjola
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1742 - 1746
  • [44] Information Systems Security Management: A Review and a Classification of the ISO Standards
    Tsohou, Aggeliki
    Kokolakis, Spyros
    Lambrinoudakis, Costas
    Gritzalis, Stefanos
    NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 220 - +
  • [45] Using information security as a response to competitor analysis systems
    Gordon, LA
    Loeb, MP
    COMMUNICATIONS OF THE ACM, 2001, 44 (09) : 70 - 75
  • [46] Information security of healthcare systems: using a biometric approach
    Andreeva, E.
    MODELLING IN MEDICINE AND BIOLOGY X, 2013, 17 : 109 - 115
  • [47] The Information Security System Synthesis Using the Graphs Theory
    Kustov, V. N.
    Yakovlev, V. V.
    Stankevich, T. L.
    PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 148 - 151
  • [48] CHANGE-RELATED BEHAVIOR AND INFORMATION-SYSTEMS
    COLLINS, F
    MANN, GJ
    OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 1988, 16 (05): : 369 - 381
  • [49] Using systems dynamics for human resources management in information systems security
    Trcek, Denis
    KYBERNETES, 2006, 35 (7-8) : 1014 - 1023
  • [50] Information Systems Control: A Review and Synthesis of the Literature
    Cram, W. Alec
    AMCIS 2011 PROCEEDINGS, 2011,