Autonomy Motivators, Serious Games, and Intention Toward ISP Compliance

被引:7
作者
Alzahrani, Ahmed [1 ]
Johnson, Chris [2 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
[2] Univ Glasgow, Sch Comp Sci, Glasgow, Lanark, Scotland
来源
INTERNATIONAL JOURNAL OF SERIOUS GAMES | 2019年 / 6卷 / 04期
关键词
Serious game for cyber security; information security policy compliance; intrinsic motivation; autonomy; Self-determination theory; SELF-DETERMINATION THEORY; INFORMATION-SYSTEMS; SECURITY; MODEL; WORK;
D O I
10.17083/ijsg.v6i4.315
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
The growing number of security breaches has become a major concern in organisations. Most often, such security breaches are related to internal employees due to their indirect or direct actions leading to information security policy (ISP) violations. Therefore, understanding employees' security behaviour and intrinsic motivation towards ISP compliance with respect to autonomy is critical. This study aims to find out whether the autonomy intrinsic motivator can be influenced by the Decisions and Disruptions (D-D) table-top game to enhance security awareness and, in turn, reinforce behavioural intention towards ISP compliance. We developed pre- and post-assessment tests on intrinsic motivation to find out whether there is a significant improvement in test scores after participants experience D-D gameplay. Thirty postgraduate students participated in the study. Overall results confirmed that the autonomy intrinsic motivator is positively influenced by the game and has a positive effect on the behavioural intention to comply with ISPs.
引用
收藏
页码:67 / 85
页数:19
相关论文
共 25 条
[1]   Perceived coach-autonomy support, basic need satisfaction and the well- and ill-being of elite youth soccer players: A longitudinal investigation [J].
Adie, James W. ;
Duda, Joan L. ;
Ntoumanis, Nikos .
PSYCHOLOGY OF SPORT AND EXERCISE, 2012, 13 (01) :51-59
[2]  
Alzahrani A, 2018, 2018 4TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2018), P125, DOI 10.1109/INFOMAN.2018.8392822
[3]  
Awais R., 2017, DECISIONS DISRUPTION, P98
[4]  
Brodie C., 2008, The Importance of Security Awareness Training
[5]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[6]  
Cialdini RB, 1998, SOCIAL INFLUENCE SOC
[7]   User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach [J].
D'Arcy, John ;
Hovav, Anat ;
Galletta, Dennis .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) :79-98
[8]   Hedonia, eudaimonia, and well-being: An introduction [J].
Deci, Edward L. ;
Ryan, Richard M. .
JOURNAL OF HAPPINESS STUDIES, 2008, 9 (01) :1-11
[9]   The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game [J].
Frey, Sylvain ;
Rashid, Awais ;
Anthonysamy, Pauline ;
Pinto-Albuquerque, Maria ;
Naqvi, Syed Asad .
PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, :496-496
[10]   Does Deterrence Work in Reducing Information Security Policy Abuse by Employees? [J].
Hu, Qing ;
Xu, Zhengchuan ;
Dinev, Tamara ;
Ling, Hong .
COMMUNICATIONS OF THE ACM, 2011, 54 (06) :54-60