2012
DOI: 10.1080/19393555.2012.668747
|View full text |Cite
|
Sign up to set email alerts
|

Examination of the Factors that Influence Teleworkers' Willingness to Comply with Information Security Guidelines

Abstract: With the increased use of teleworkers, it is important to understand how teleworker attitudes are related to willingness to accept and follow guidelines that maintain data security in the telework environment. The objective of the study was to evaluate the application of the theory of planned behavior and the idea of subjective norms as a means of explaining teleworker compliance in using information technology (IT) security guidelines in a telework environment. A sample of 150 respondents who considered thems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 41 publications
(125 reference statements)
0
4
0
Order By: Relevance
“…The findings of this study differ from those in the organizational domain where expectations may be very explicit, and where the "significant others" include authority figures as opposed to just friends and family. Godlove (2012) noted that direct supervisors were more important determinants of the effect of subjective norm on security intentions than peers, and in the personal computing domain there are no formal supervisors.…”
Section: Discussionmentioning
confidence: 99%
“…The findings of this study differ from those in the organizational domain where expectations may be very explicit, and where the "significant others" include authority figures as opposed to just friends and family. Godlove (2012) noted that direct supervisors were more important determinants of the effect of subjective norm on security intentions than peers, and in the personal computing domain there are no formal supervisors.…”
Section: Discussionmentioning
confidence: 99%
“…Personal attitudes about security are formative in the motivation for and engagement in pro-security behaviors consistent with ISP requirements (Bulgurcu et al , 2010; Goodlove, 2011). It has long been known that cybersecurity regimes that rely on technical controls, alone, are inadequate to protect firms (Pedayachee, 2012), and to this end, it is our expectation that an important role for “consultative IS auditors” (Steinbart et al , 2013) is to identify and remediate both platform-based and implementation-based CyberComplacency in the firm.…”
Section: Case Of the Cybercomplacent Technology Usermentioning
confidence: 99%
“…Five of the articles (Dauda, Santhapparaj, Asirvatham, & Raman, 2007;Godlove, 2012;Hidayanto,Saifulhaq,&Handayani,2012;Mussa&Cohen,2013;Saeri,Ogilvie,LaMacchia,Smith, &Louis,2014)didnotincludedescriptionand7 (Bulgurcu,Cavusoglu,&Benbasat,2009;Cox, 2012;Dauda,Santhapparaj,Asirvatham,&Raman,2007;Hidayanto,Saifulhaq,&Handayani,2012;Liao,Luo,Gurung,&Li,2009;Saeri,Ogilvie,LaMacchia,Smith,&Louis,2014;Zhang,Reithel, &Li,2009)didnotincludemeasuresforattitude.Theremainingarticleswereanalyzedforthemost commonlyusedattitudedefinitionandmeasures.…”
Section: Methodsmentioning
confidence: 99%