Information Systems Security Leadership: An Empirical Study of Behavioral Influences

被引:0
作者
Winkfield, Marcus [1 ]
Parrish, James [1 ]
Tejay, Gurvirender [2 ]
机构
[1] Nova Southeastern Univ, Coll Engn & Comp, Ft Lauderdale, FL 33314 USA
[2] St Thomas Univ, Gus Machado Sch Business, Miami, FL USA
来源
AMCIS 2017 PROCEEDINGS | 2017年
关键词
Security; leadership; compliance; control; administrative; behavioral; risk management; expectancy theory; POLICY COMPLIANCE; MOTIVATION; INSIGHTS; WORK;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Systems Security Leadership (ISSL) uses leadership concepts in the field of information systems (IS) security. Despite the adoption of technical and managerial approaches, organizations still face issues motivating employee security compliance. In this paper, we argue organizations need strong leadership to encourage employees. Using the expectancy theory, we created a theoretical model to help understand the influence of leadership behaviors on non-technical controls IS security controls. Our research in progress is expected to contribute a model for future research in the field of IS security, as well as promote organizations to integrate leadership concepts into their IS security programs.
引用
收藏
页数:5
相关论文
共 29 条
[1]   Information system security commitment: A study of external influences on senior management [J].
Barton, Kevin A. ;
Tejay, Gurvirender ;
Lane, Michael ;
Terrell, Steve .
COMPUTERS & SECURITY, 2016, 59 :9-25
[2]   If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security [J].
Boss, Scott R. ;
Kirsch, Laurie J. ;
Angermeier, Ingo ;
Shingler, Raymond A. ;
Boss, R. Wayne .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :151-164
[3]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[4]   Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures [J].
D'Arcy, John ;
Hovav, Anat .
JOURNAL OF BUSINESS ETHICS, 2009, 89 :59-71
[5]  
Dunkerly K., 2009, AMCIS 2009 P
[6]   Shaping intention to resist social engineering through transformational leadership, information security culture and awareness [J].
Flores, Waldo Rocha ;
Ekstedt, Mathias .
COMPUTERS & SECURITY, 2016, 59 :26-44
[7]   From culture to disobedience: Recognising the varying user acceptance of IT security [J].
Furnell, Steven ;
Thomson, Kerry-Lynn .
Computer Fraud and Security, 2009, 2009 (02) :5-10
[8]  
Hardie L, 2015, LESBIAN GEOGRAPHIES: GENDER, PLACE AND POWER, P113
[9]  
Hazari S., 2008, Journal of Information Privacy Security, V4, P3
[10]   Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness [J].
Herath, Tejaswini ;
Rao, H. R. .
DECISION SUPPORT SYSTEMS, 2009, 47 (02) :154-165