2017
DOI: 10.1016/j.jisa.2016.06.002
|View full text |Cite
|
Sign up to set email alerts
|

Exploring behavioral information security networks in an organizational context: An empirical case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
5

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(23 citation statements)
references
References 34 publications
0
18
0
5
Order By: Relevance
“…Wird den verantwortlichen Personen vertraut, wirkt sich dies positiv auf die Einhaltung der Informationssicherheitsvorschriften aus und umgekehrt [7], [19], [21], [27], [28]. Häufig werden Sicherheitsvorschriften als zwingend oder bindend definiert [29].…”
Section: Inhaltliche Technische Und Organisatorische Faktoren Und Maunclassified
“…Wird den verantwortlichen Personen vertraut, wirkt sich dies positiv auf die Einhaltung der Informationssicherheitsvorschriften aus und umgekehrt [7], [19], [21], [27], [28]. Häufig werden Sicherheitsvorschriften als zwingend oder bindend definiert [29].…”
Section: Inhaltliche Technische Und Organisatorische Faktoren Und Maunclassified
“…Theory of planned behavior The theory says that the attitude toward the behavior and subjective norms form an individual's behavioral intentions and actions 3,30,31 Neutralization theory Neutralization theory is a psychological method for people to turn off "inner resistance" when they perform or are about to perform something that they perceive as ethically wrong 3 Learning theory Learning theory explains how information is understood, treated, and retained by participants during the learning process 3 Protection motivation theory The protection motivation theory argues that people guard themselves based on four factors: (a) the perceived severity of an event and the occurrence; (b) vulnerability of the person; (c) the person's ability for the preventive behavior; and (d) believe in his ability to protect 3,30 General deterence theory General Deterrence is a plan designed to deter an opponent from taking actions which are not yet initiated or in another case to prevent people from performing actions that opponent wants them to do 30 Social learning theory Social Learning Theory asserts that people acquire knowledge from one another, via perception, memory, and modeling 30 Social bonding theory Social bond theory is used to explain social issues. Factors of social bonding comprise an attachment to families, devotion to social norms and institutions, engagement in activities, and the faith that these things are essential [30][31][32] General strains theory Innovation happens when community stresses culturally acceptable goals but at the same time provides insufficient opportunity to accomplish these goals with the legal institutionalized means. People finding themselves in financial strain may find a solution of crime in order to achieve goals 30 Organizational injustice If the leaders of the institution are authoritarian, their effort to solve the problems may be ineffective due to many reasons and may increase organizational stress and efficiency of the employees.…”
Section: Theory Explanation Referencesmentioning
confidence: 99%
“…Factors of social bonding comprise an attachment to families, devotion to social norms and institutions, engagement in activities, and the faith that these things are essential [30][31][32] General strains theory Innovation happens when community stresses culturally acceptable goals but at the same time provides insufficient opportunity to accomplish these goals with the legal institutionalized means. People finding themselves in financial strain may find a solution of crime in order to achieve goals 30 Organizational injustice If the leaders of the institution are authoritarian, their effort to solve the problems may be ineffective due to many reasons and may increase organizational stress and efficiency of the employees. Moreover, this may result in guilt, anger, and desire for justice which may result in socially irresponsible and ethically compromised organizational environment 30 Technology threat avoidance theory Technology Threat Avoidance Theory describes why individual IT user adapts threat avoidance behaviors.…”
Section: Theory Explanation Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Vulnerability Detection Technology has improved the level of network security in a certain extent, but can only detect a certain network vulnerability, the limitation is great, unable to detect the whole network, so the vulnerability detection technology plays a limited role in improving network security [6]. Firewall between the internal and external network built a high wall, increases the degree of security of Intranet Network.…”
Section: Introductionmentioning
confidence: 99%