The Forgotten Model - Validating the Integrated Behavioral Model in Context of Information Security Awareness

被引:0
作者
Schuetz, Andreas E. [1 ]
Fertig, Tobias [1 ]
机构
[1] Univ Appl Sci Wurzburg Schweinfurt, Wurzburg, Germany
来源
PROCEEDINGS OF THE 56TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES | 2023年
关键词
Information Security Awareness; ISA; Human Factor; Information Security; Integrated Behavioral Model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The behavior of employees has a strong influence on the information security of a company. Whether humans behave information security compliant depends on a large extent on their information security awareness (ISA). Social psychology provides an understanding about factors that influence awareness and thus gives relevant insights on how to increase an employee's ISA. A promising theory from health psychology is the Integrated Behavioral Model (IBM). To validate the significance of the IBM for ISA, a structured literature review about models that explain ISA has been conducted. The analysis of the found ISA models and their constructs showed that the IBM indeed includes all found factors. Based on the findings, the paper presents an extended model of the IBM within the ISA context with a higher level of detail. The model can be used to analyze individualized ISA and help companies to enhance ISA in a systematic way.
引用
收藏
页码:6841 / 6850
页数:10
相关论文
共 41 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]   The theory of planned behavior: Frequently asked questions [J].
Ajzen, Icek .
HUMAN BEHAVIOR AND EMERGING TECHNOLOGIES, 2020, 2 (04) :314-324
[3]  
Alohali M, 2017, 2017 COMPUTING CONFERENCE, P844, DOI 10.1109/SAI.2017.8252194
[4]   Gender difference and employees' cybersecurity behaviors [J].
Anwar, Mohd ;
He, Wu ;
Ash, Ivan ;
Yuan, Xiaohong ;
Li, Ling ;
Xu, Li .
COMPUTERS IN HUMAN BEHAVIOR, 2017, 69 :437-443
[5]  
Bada M., 2014, Global Cyber Security Capacity Centre: Draft Working Paper, P188
[6]   Determinants of early conformance with information security policies [J].
Belanger, France ;
Collignon, Stephane ;
Enget, Kathryn ;
Negangard, Eric .
INFORMATION & MANAGEMENT, 2017, 54 (07) :887-901
[7]  
Bosworth S., 2002, Computer security handbook
[8]  
Bredenkamp Ileen E., 2021, Informatics and Cybernetics in Intelligent Systems: Proceedings of 10th Computer Science On-line Conference 2021. Lecture Notes in Networks and Systems (288), P682, DOI 10.1007/978-3-030-77448-6_66
[9]  
Brocke v. J., 2009, ECIS
[10]  
Connolly Lena Y., 2018, Advances in Information Systems Development. Methods, Tools and Management. Lecture Notes in Information Systems and Organisation (LNISO 26), P79, DOI 10.1007/978-3-319-74817-7_6