2015
DOI: 10.1007/978-3-319-22906-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Factors that Influence Employees’ Security Behavior for Enhancing ISP Compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 25 publications
0
12
0
2
Order By: Relevance
“…In the information system context, anticipating the intention to involve in protective actions has been investigated by many types of research [ [44] , [45] , [46] ]. PMT indicates two main directions in motivating the individuals to adopt protective actions: risk evaluation and coping evaluation [ 44 , 47 ]. Risk evaluation is one's estimation of the degree to which a potential risk is possible to happen and how serious it can be.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…In the information system context, anticipating the intention to involve in protective actions has been investigated by many types of research [ [44] , [45] , [46] ]. PMT indicates two main directions in motivating the individuals to adopt protective actions: risk evaluation and coping evaluation [ 44 , 47 ]. Risk evaluation is one's estimation of the degree to which a potential risk is possible to happen and how serious it can be.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Studies exploring acceptability in the field tend to focus on the factors influencing the acceptance of security policies and solutions within organizational context. Topa and Karyda (2015) recently reviewed the literature on employee security behaviour and classified the factors influencing them into individual, organizational and technical. Accordingly, organizations aiming to improve security policy compliance are recommended to adopt a holistic approach that addresses issues related to all three category of factors.…”
Section: Issues Related To the Adoption Of Cybersecurity Controlsmentioning
confidence: 99%
“…Um ein gewünschtes Informationssicherheitsniveau zu erreichen, werden Informationssicherheitsvorschriften (Information Security Policies) als sozio-organisatorische Maßnahmen eingesetzt. Informationssicherheitsvorschriften sind ein "statement of the roles and responsibilities of the employees to safeguard the information and technology resources of their organizations" [21]. In einem formellen Dokument wird festgelegt, was erwünschtes und nicht-erwünschtes Verhalten in Bezug auf Informationssicherheit bedeutet [22].…”
Section: Stand Der Forschungunclassified
“…Auch die handelnden Personen spielen eine bedeutende Rolle. Wird den verantwortlichen Personen vertraut, wirkt sich dies positiv auf die Einhaltung der Informationssicherheitsvorschriften aus und umgekehrt [7], [19], [21], [27], [28]. Häufig werden Sicherheitsvorschriften als zwingend oder bindend definiert [29].…”
Section: Inhaltliche Technische Und Organisatorische Faktoren Und Maunclassified