Sustainable Information Security Behavior Management: An Empirical Approach for the Causes of Employees’ Voice Behavior
نویسندگان
چکیده
As organizations’ interest in information resources expands, their investments security (IS), such as the introduction of IS policies and new technologies, are also expanding. Nevertheless, incidents threats within organization have not decreased. This study aims to protect assets by maintaining level continuous behavior insiders. Moreover, this suggests a method induce individuals confirming relationship between IS-related voice organizational justice, which is an action concept that provides opinions achieve goals. derives research models hypotheses through previous studies tests structural equation modeling. The target subjects members who introduced policy. A total 325 samples were secured questionnaire method, verified. Results reveal related negatively influenced work impediment positively identification. In addition, procedural justice influence prior actions affect cause personal (work identification). Additionally, sensitivity adjusted impact behavior. presents importance continuously. it has practical implications efforts improve behaviors vary according individual sensitivity.
منابع مشابه
an inverstigation into the shrinkage behavior (kinetics) of microfilled hybrid and nano dental composites
چکیده ندارد.
15 صفحه اولInformation-seeking behavior of the everyday life of Kermanshah Kurds in social networks: an exploratory approach
Aim: Growing number social network users for communicating between groups has made them a major segment of peoplechr('39')s social life. So, the purpose of this study is to identify the factors affecting the use of social networks and information-seeking behavior in daily life of the Kurds in virtual networks and effect of ethnic identity on the behavior of information-seeking in their da...
متن کاملEmployees' Adherence to Information Security Policies: An Empirical Study
The key threat to information security is constituted by careless employees who do not comply with information security policies. To ensure that employees comply with organizations’ information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has criticized these measures as lacking theoretically and empirically grou...
متن کاملPersuasive Information Security. A Behavior Change Support System to Help Employees Protect Organizational Information Security
Digital information is an important asset in the corporate world. Organizations typically devise policies and guidelines to help employees protect the security of such information. Complying with these policies can often be confusing and difficult and may obstruct the task at hand, thus potentially leading employees to circumvent or ignore these policies. Commercial technology and training prog...
متن کاملthe use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sustainability
سال: 2021
ISSN: ['2071-1050']
DOI: https://doi.org/10.3390/su13116077