Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios

被引:0
|
作者
Jeffrey D. Wall
Prashant Palvia
John D’Arcy
机构
[1] Michigan Technological University,College of Business
[2] The University of North Carolina at Greensboro,Bryan School of Business and Economics
[3] University of Delaware,Department of Accounting and Management Information Systems
来源
关键词
Control theory; Information security; Security behavior; Security controls;
D O I
暂无
中图分类号
学科分类号
摘要
Employees are a major cause of information security vulnerabilities and breaches. Organizations implement controls, such as information security policies, fear appeals, and computer monitoring, to manage the security threats that employees pose. Behavioral information security research seeks to understand how these security controls influence employees’ behaviors. In practice, organizations adopt many coexisting security controls in security control portfolios (SCPs). Unfortunately, the complexities of SCPs are not well understood in the information security literature. To assist in studying SCPs, we present a typology and a theoretical model of security control grounded in an extension of control theory. We identify twelve types of security controls that can exist in practice based on three important control dimensions. We develop a number of propositions to explain how the complementarity of security controls in SCPs affect motivation to protect information. Our efforts produce a behaviorally grounded extension of control theory that is well suited for studying individual-level security behavior governed by complex SCPs.
引用
收藏
页码:637 / 658
页数:21
相关论文
共 50 条
  • [21] BEHAVIORAL AND PSYCHOPHYSIOLOGICAL EFFECTS OF STRESS ON GLUCOSE CONTROL
    PEYROT, MF
    MCMURRY, JF
    DIABETES, 1986, 35 : A21 - A21
  • [22] Multiple control mechanisms for employee health and safety integration: effects and complementarity
    Passetti, Emilio
    Battaglia, Massimo
    Testa, Francesco
    Heras-Saizarbitoria, Inaki
    ACCOUNTING AUDITING & ACCOUNTABILITY JOURNAL, 2020, 33 (07): : 1595 - 1626
  • [23] QUALITATIVE BEHAVIORAL ANALYZER FOR FAULT DETECTION AND CYBER SECURITY OF CONTROL NETWORKS
    Pothuwila, Kalana
    Berg, Jordan M.
    7TH ANNUAL DYNAMIC SYSTEMS AND CONTROL CONFERENCE, 2014, VOL 2, 2014,
  • [24] Tracking control of complementarity Lagrangian systems
    Bourgeot, JM
    Brogliato, B
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2005, 15 (06): : 1839 - 1866
  • [25] The complementarity of autonomy and control in mobile work
    Porter, Amanda J.
    van den Hooff, Bart
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2020, 29 (02) : 172 - 189
  • [26] Binary Theorizing Does Not Account for Action Control
    Hommel, Bernhard
    FRONTIERS IN PSYCHOLOGY, 2019, 10
  • [27] Consensus Complementarity Control for Multicontact MPC
    Aydinoglu, Alp
    Wei, Adam
    Huang, Wei-Cheng
    Posa, Michael
    IEEE TRANSACTIONS ON ROBOTICS, 2024, 40 : 3879 - 3896
  • [28] Optimal control strategies for portfolios of managed futures
    Criner, OH
    COMPUTATIONAL FINANCE AND ITS APPLICATIONS, 2004, : 189 - 201
  • [29] A stochastic control approach to managed futures portfolios
    Leung, Tim
    Yan, Raphael
    INTERNATIONAL JOURNAL OF FINANCIAL ENGINEERING, 2019, 6 (01)
  • [30] PPLUS - Software agents in the control of inversion portfolios
    Cattafi, Ricardo
    Metzner, Christiane
    Gomez, Eleazar
    MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 347 - +