Investigation into the formation of information security influence: Network analysis of an emerging organisation

被引:5
作者
Dang-Phan, Duy [1 ]
Pittayachawan, Siddhi [1 ]
Bruno, Vince [2 ]
机构
[1] RMIT Univ, Sch Business IT & Logist, Informat Syst & Supply Chain Management, Melbourne, Vic, Australia
[2] RMIT Univ, Sch Business IT & Logist, Informat Syst, Melbourne, Vic, Australia
关键词
Information security influence; Behavioural security; Information security behaviour; Information security management; Social network analysis; POLICY COMPLIANCE; SOCIAL-INFLUENCE; MERGER; MODEL; DETERRENCE; INSIGHTS; VIEW;
D O I
10.1016/j.cose.2017.05.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While prior research has been examining information security behaviours in mature environments with formal policies and practices, there is less attention paid to new or transforming environments that lack security controls. It is crucial to understand what factors affect the formation of an emerging information security environment, so that security managers can make use of the forming mechanisms to improve the security environment without relying too much on enforcement. This research adopts exponential random graph modelling to predict the occurrence of information security influence among 114 employees in a recently established construction organisation. Our empirical findings show that physically co-locating, as well as having specific senior levels and similar tenure can result in more security influence. Other contributing work relationships include the exchange of work related advice, interpersonal trust, and seeing others as role model and long-term collaborators. The structural features of the information security influence network were also examined, which offer strategies for security managers to diffuse security behaviours within the workplace. Furthermore, specific directions for future network research were elaborated in detail. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:111 / 123
页数:13
相关论文
共 52 条
[1]  
Ajzen I., 2011, HDB THEORIES SOCIAL, V1, P438, DOI [DOI 10.4135/9781446249215.N22, 10.4135/9781446249215.n22]
[2]  
[Anonymous], 1959, STUDIES SOCIAL POWER
[3]  
[Anonymous], 2012, COMPUT FRAUD SEC MAR
[4]  
[Anonymous], INFO TECH PEOPL
[5]   A relational view of information seeking and learning in social networks [J].
Borgatti, SP ;
Cross, R .
MANAGEMENT SCIENCE, 2003, 49 (04) :432-445
[6]  
Borgatti SP, 2013, SAGE PUBLICATIONS
[7]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[8]   Understanding employee-level dynamics within the merger and acquisition process [J].
Creasy, Todd ;
Stull, Michael ;
Peck, Simon .
JOURNAL OF GENERAL MANAGEMENT, 2009, 35 (02) :21-42
[9]   Future directions for behavioral information security research [J].
Crossler, Robert E. ;
Johnston, Allen C. ;
Lowry, Paul Benjamin ;
Hu, Qing ;
Warkentin, Merrill ;
Baskerville, Richard .
COMPUTERS & SECURITY, 2013, 32 :90-101
[10]   Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model [J].
D'Arcy, John ;
Devaraj, Sarv .
DECISION SCIENCES, 2012, 43 (06) :1091-1124