2014
DOI: 10.1109/tpc.2014.2374011
|View full text |Cite
|
Sign up to set email alerts
|

A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
51
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(53 citation statements)
references
References 118 publications
2
51
0
Order By: Relevance
“…Organizations are challenged to make information security an everyday practice [10], however, it is often the case that organizations are led by thought "business first, then security" [11] due to perception among employees that security is just on the way and hampers the ability of employees to accomplish tasks [8], [12]. This results with viewing information security as a burden and not wanting to spend money on it [13] and, because of this, organizations often do nothing about security as long as everything is fine, but when things go wrong, they suddenly pay attention, but then one must make much more to recover from an unwanted situation, and complete recovery is sometimes impossible [8].…”
Section: Information Security In Organizationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Organizations are challenged to make information security an everyday practice [10], however, it is often the case that organizations are led by thought "business first, then security" [11] due to perception among employees that security is just on the way and hampers the ability of employees to accomplish tasks [8], [12]. This results with viewing information security as a burden and not wanting to spend money on it [13] and, because of this, organizations often do nothing about security as long as everything is fine, but when things go wrong, they suddenly pay attention, but then one must make much more to recover from an unwanted situation, and complete recovery is sometimes impossible [8].…”
Section: Information Security In Organizationsmentioning
confidence: 99%
“…Giving the above mentioned, some of the key success factors in implementing, accepting or managing information security in organizations found in the literature are: senior management support [2], [7], [8], [9], [36], [24], [12], [33], [19], [35], [13], [37], [26], defined security policy [8], [7], [9], [36], [24], [12], [19], [35], [38], [37], [26], education, training and awareness [7], [8], [9], [36], [24], [12], [33], [19], [35], [2], [13], [38], [37], [39], [26], defined roles and responsibilities [7], [9], [10], information security and business alignment [24], [33], [13], information security culture [10], [24],…”
Section: Information Systems Security Successmentioning
confidence: 99%
See 1 more Smart Citation
“…Trained security champions are end-users who possess domain-specific security knowledge and can provide timely and accessible assistance to other users within a department. Prior studies have found the availability of information security resources has a positive impact on security compliance (Chan et al 2005, Goo et al 2014. While many organisations …”
Section: Improving Risk Communications Between Information Security Smentioning
confidence: 99%
“…A majority of prior researches in the field have explored the motivation for security compliance, which consists of a wide range of internal and external factors to an individual. Internal factors can be for example, self-efficacy (Dang- , Johnston and Warkentin 2010, Rhee et al 2009) or security goal orientations (Pham and Nkhoma 2015), while external factors come from sanctions and rewards (D'Arcy et al 2014, Herath andRao 2009a) , security culture (Ruighaver et al 2007) and climate (Goo et al 2014, as well as security demands and resources , Pham et al 2016). …”
Section: Introductionmentioning
confidence: 99%