Information Security Behavior: Towards Multi-Stage Models

In order to ensure that employees abide by their organizations’ Information Security Policies (ISP), a number of information security policy compliance measures have been proposed in the past. If different factors can explain/predict the information security behavior of those employees who do know t...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
VerfasserInnen: Karjalainen, Mari (VerfasserIn) ; Siponen, Mikko (VerfasserIn) ; Pahnila, Seppo (VerfasserIn)
Medienart: Elektronisch Buch
Sprache:Englisch
Veröffentlicht: 2013
In:Jahr: 2013
Online-Zugang: Volltext (kostenfrei)
Verfügbarkeit prüfen: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1865848077
003 DE-627
005 20250121054855.0
007 cr uuu---uuuuu
008 231017s2013 xx |||||o 00| ||eng c
035 |a (DE-627)1865848077 
035 |a (DE-599)KXP1865848077 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Karjalainen, Mari  |e VerfasserIn  |4 aut 
245 1 0 |a Information Security Behavior: Towards Multi-Stage Models 
264 1 |c 2013 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a In order to ensure that employees abide by their organizations’ Information Security Policies (ISP), a number of information security policy compliance measures have been proposed in the past. If different factors can explain/predict the information security behavior of those employees who do know the ISP and of those who do not know the ISP, such as is suggested by stage theories, and the existing studies do not control for this issue, then the practical relevance of the existing models will be decreased. In order to test whether different factors explain/predict the information security behavior of those employees who do know the ISP and of those who do not know the ISP, we designed a study using the Protection Motivation Theory (PMT) as the baseline theory. Employees’ ISP knowledge was tested by asking a few questions related to their organization’s ISP. We divided the data (N=513) into that related to a low knowledge group (regarding the organizations’ ISP) and that of a high knowledge group. The results show that the findings between the low knowledge group and the high knowledge group differ substantially. Our results provide an explanation for the inconsistent results in previous IS security research 
700 1 |a Siponen, Mikko  |e VerfasserIn  |4 aut 
700 1 |a Pahnila, Seppo  |e VerfasserIn  |4 aut 
856 4 0 |u https://core.ac.uk/download/301359547.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4390886479 
LOK |0 003 DE-627 
LOK |0 004 1865848077 
LOK |0 005 20231017043730 
LOK |0 008 231017||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE17803925 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw