Search results
1 – 10 of 183Tejaswini Herath, Myung-Seong Yim, John D’Arcy, Kichan Nam and H.R. Rao
Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security…
Abstract
Purpose
Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems (IS) security literature have used neutralization and moral disengagement (MD) perspectives to examine employee rationalizations of noncompliant security behaviors. Extending this prior work, the purpose of this paper is to identify mechanisms of security education, training, and awareness (SETA) programs and deterrence as well as employees’ organizational commitment in influencing MD of security policy violations and develop a theoretical model to test the proposed relationships.
Design/methodology/approach
The authors validate and test the model using the data collected from six large multinational organizations in Korea using survey-based methodology. The model was empirically analyzed by structural equation modeling.
Findings
The results suggest that security policy awareness (PA) plays a central role in reducing MD of security policy violations and that the certainty of punishment and immediacy of enforcing penalties are instrumental toward reducing such MD; however, the higher severity of penalties does not have an influence. The findings also suggest that SETA programs are an important mechanism in creating security PA.
Originality/value
The paper expands the literature in IS security that has examined the role of moral evaluations. Drawing upon MD theory and social cognitive theory, the paper points to the central role of SETA and security PA in reducing MD of security policy violations, and ultimately the likelihood of this behavior. The paper not only contributes to theory but also provides important insights for practice.
Details
Keywords
Ofir Turel, Christian Matt, Manuel Trenz, Christy M.K. Cheung, John D’Arcy*, Hamed Qahri-Saremi* and Monideepa Tarafdar*
Digital technologies have diffused into many personal life domains. This has created many new phenomena that require systematic theorizing, testing and understanding. Such…
Abstract
Purpose
Digital technologies have diffused into many personal life domains. This has created many new phenomena that require systematic theorizing, testing and understanding. Such phenomena have been studied under the Digitization of the Individual (DOTI) umbrella and have been discussed in the DOTI pre-International Conference on Information Systems workshop for the last three years (from 2015 to 2017). While prior years have focused on a variety of issues, this year (2018) we decided to put special emphasis on negative effects of the DOTI, i.e., “the dark side” of the DOTI.
Design/methodology/approach
This manuscript reports on a panel of three experts (in alphabetical order: John D’Arcy, Hamed Qahri-Saremi and Monideepa Tarafdar) who presented their past research in this domain, as well as their outlook for future research and methodologies in research on the DOTI.
Findings
The authors introduce the topic, chronicle the responses of the panelists to the questions the authors posed, and summarize and discuss their response, such that readers can develop a good idea regarding next steps in research on the dark side of the DOTI.
Originality/value
The authors introduce the topic of the dark sides of DOTI and point readers to promising research directions and methodologies for further exploring this relatively uncharted field of research.
Details
Keywords
The design of bibliographic records for computer input is explored. The elements of a record provide bibliographic description, serve as retrieval keys, facilitate ordered…
Abstract
The design of bibliographic records for computer input is explored. The elements of a record provide bibliographic description, serve as retrieval keys, facilitate ordered filing, and indicate locations. The effect of each of these functions on the form of the record is discussed. Problems are raised that must be resolved before an optimal record can be designed.
The purpose of this paper is to examine the influence of security-related and employment relationship factors on employees’ security compliance decisions. A major…
Abstract
Purpose
The purpose of this paper is to examine the influence of security-related and employment relationship factors on employees’ security compliance decisions. A major challenge for organizations is encouraging employee compliance with security policies, procedures and guidelines. Specifically, we predict that security culture, job satisfaction and perceived organizational support have a positive effect on employees’ security compliance intentions.
Design/methodology/approach
This study used a survey approach for data collection. Data were collected using two online surveys that were administered at separate points in time.
Findings
Our results provide empirical support for security culture as a driver of employees’ security compliance in the workplace. Another finding is that an employee’s feeling of job satisfaction influences his/her security compliance intention, although this relationship appears to be contingent on the employee’s position, tenure and industry. Surprisingly, we also found a negative relationship between perceived organizational support and security compliance intention.
Originality/value
Our results provide one of the few empirical validations of security culture, and we recognize its multidimensional nature as conceptualized through top management commitment to security (TMCS), security communication and computer monitoring. We also extend security compliance research by considering the influence of employment relationship factors drawn from the organizational behavior literature.
Details
Keywords
Alexandra L. Ferrentino, Meghan L. Maliga, Richard A. Bernardi and Susan M. Bosco
This research provides accounting-ethics authors and administrators with a benchmark for accounting-ethics research. While Bernardi and Bean (2010) considered publications…
Abstract
This research provides accounting-ethics authors and administrators with a benchmark for accounting-ethics research. While Bernardi and Bean (2010) considered publications in business-ethics and accounting’s top-40 journals this study considers research in eight accounting-ethics and public-interest journals, as well as, 34 business-ethics journals. We analyzed the contents of our 42 journals for the 25-year period between 1991 through 2015. This research documents the continued growth (Bernardi & Bean, 2007) of accounting-ethics research in both accounting-ethics and business-ethics journals. We provide data on the top-10 ethics authors in each doctoral year group, the top-50 ethics authors over the most recent 10, 20, and 25 years, and a distribution among ethics scholars for these periods. For the 25-year timeframe, our data indicate that only 665 (274) of the 5,125 accounting PhDs/DBAs (13.0% and 5.4% respectively) in Canada and the United States had authored or co-authored one (more than one) ethics article.
Details
Keywords
Through a survey of 200 employees working in five of the thirty establishments analysed in previous research about the microeconomic effects of reducing the working time…
Abstract
Through a survey of 200 employees working in five of the thirty establishments analysed in previous research about the microeconomic effects of reducing the working time (Cahier 25), the consequences on employees of such a reduction can be assessed; and relevant attitudes and aspirations better known.
We learn with interest and pleasure that, by the unanimous vote of the Council, the position of Executive Officer to the Library Association has been given to Mr. Guy…
Abstract
We learn with interest and pleasure that, by the unanimous vote of the Council, the position of Executive Officer to the Library Association has been given to Mr. Guy Keeling, B.A. We understand that over one hundred applicants were considered for the post, and that it was felt that by education and experience Mr. Keeling was eminently qualified for the work which lies ahead of the Association. Mr. Keeling is a Cambridge man, Still on the sunny side of forty, whose pleasing personality is known to many librarians who have met him at conferences of “Aslib” or at meetings of the London and Home Counties Branch. As for his work as secretary of Aslib, it has proved him to be a man of most efficient organizing capacity. We offer him a welcome to the larger sphere of librarianship and we feel sure that all our readers will do the same, and, what is better, will support him in all his efforts in it.
Presents a case study on union‐based research and education activity generated in response to restructuring in the Canadian telecommunications industry and workplace…
Abstract
Presents a case study on union‐based research and education activity generated in response to restructuring in the Canadian telecommunications industry and workplace reorganization. Findings suggest that an education/research/policy dynamic rooted in the union local helps to build the potential for workplace democracy and organizational capacity in the labour movement.
Details
Keywords
Lena Yuryna Connolly, Michael Lang, John Gathegi and Doug J. Tygar
This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security…
Abstract
Purpose
This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security countermeasures tend to influence employee security actions. An increasing number of information security breaches in organisations presents a serious threat to the confidentiality of personal and commercially sensitive data. While recent research shows that humans are the weakest link in the security chain and the root cause of a great portion of security breaches, the extant security literature tends to focus on technical issues.
Design/methodology/approach
This paper builds on general deterrence theory and prior organisational culture literature. The methodology adapted for this study draws on the analytical grounded theory approach employing a constant comparative method.
Findings
This paper demonstrates that procedural security countermeasures and organisational culture tend to affect security behaviour in organisational settings.
Research limitations/implications
This paper fills the void in information security research and takes its place among the very few studies that focus on behavioural as opposed to technical issues.
Practical implications
This paper highlights the important role of procedural security countermeasures, information security awareness and organisational culture in managing illicit behaviour of employees.
Originality/value
This study extends general deterrence theory in a novel way by including information security awareness in the research model and by investigating both negative and positive behaviours.
Details