Security-related behavior in using information systems in the workplace: A review and synthesis

被引:87
作者
Guo, Ken H. [1 ]
机构
[1] Western New England Univ, Coll Business, Springfield, MA 01119 USA
关键词
Information security; Security-related behavior; Security assurance behavior; Security risk-taking behavior; Security damaging behavior; Security violation; POLICY COMPLIANCE; PROTECTION MOTIVATION; COMPUTER ABUSE; DETERRENCE; ORGANIZATIONS; ETHICS; MISUSE; MODEL; WORK;
D O I
10.1016/j.cose.2012.10.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security-related behavior in the workplace has recently drawn much attention from scholars in the information systems literature. Many studies, however, have reported inconsistent and sometimes contradictory results about the effects of some key factors such as sanctions. We argue that one of the reasons causing the inconsistent findings is the divergent conceptualizations of security-related behavior. In this paper, we conducted an extensive review of the divergent concepts. Many of the concepts overlap with each other on some dimensions and yet are different on others. By delineating and synthesizing the differences, we proposed a framework for conceptualizing security-related behavior. The framework can facilitate the development of consistent and comparable terms and concepts in future studies. Implications for research are also discussed. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:242 / 251
页数:10
相关论文
共 34 条
[1]   The information security digital divide between information security managers and users [J].
Albrechtsen, Eirik ;
Hovden, Jan .
COMPUTERS & SECURITY, 2009, 28 (06) :476-490
[2]   Modeling IT ethics: A study in situational ethics [J].
Banerjee, D ;
Cronan, TP ;
Jones, TW .
MIS QUARTERLY, 1998, 22 (01) :31-60
[3]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[4]  
Chan M., 2005, J INFORM PRIVACY SEC, V1, P18, DOI [DOI 10.1080/15536548.2005.10855772, 10.1080/15536548.2005.10855772]
[5]   A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings [J].
D'Arcy, John ;
Herath, Tejaswini .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2011, 20 (06) :643-658
[6]   User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach [J].
D'Arcy, John ;
Hovav, Anat ;
Galletta, Dennis .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) :79-98
[7]  
Fazio R.H., 1995, ATTITUDE STRENGTH AN
[8]   Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model [J].
Guo, Ken H. ;
Yuan, Yufei ;
Archer, Norman P. ;
Connelly, Catherine E. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2011, 28 (02) :203-236
[9]   The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions [J].
Harrington, SJ .
MIS QUARTERLY, 1996, 20 (03) :257-278
[10]  
Heckhausen H., 1985, GOAL DIRECTED BEHAV, P134