Sustainable Information Security Behavior Management: An Empirical Approach for the Causes of Employees’ Voice Behavior

نویسندگان

چکیده

As organizations’ interest in information resources expands, their investments security (IS), such as the introduction of IS policies and new technologies, are also expanding. Nevertheless, incidents threats within organization have not decreased. This study aims to protect assets by maintaining level continuous behavior insiders. Moreover, this suggests a method induce individuals confirming relationship between IS-related voice organizational justice, which is an action concept that provides opinions achieve goals. derives research models hypotheses through previous studies tests structural equation modeling. The target subjects members who introduced policy. A total 325 samples were secured questionnaire method, verified. Results reveal related negatively influenced work impediment positively identification. In addition, procedural justice influence prior actions affect cause personal (work identification). Additionally, sensitivity adjusted impact behavior. presents importance continuously. it has practical implications efforts improve behaviors vary according individual sensitivity.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information-seeking behavior of the everyday life of Kermanshah Kurds in social networks: an exploratory approach

Aim: Growing number social network  users for communicating between   groups   has made them a major  segment of peoplechr('39')s social life. So, the purpose of this study is to identify the factors affecting the use of social networks and information-seeking behavior in daily life of the Kurds in virtual networks and effect of ethnic identity on the behavior of information-seeking in their da...

متن کامل

Employees' Adherence to Information Security Policies: An Empirical Study

The key threat to information security is constituted by careless employees who do not comply with information security policies. To ensure that employees comply with organizations’ information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has criticized these measures as lacking theoretically and empirically grou...

متن کامل

Persuasive Information Security. A Behavior Change Support System to Help Employees Protect Organizational Information Security

Digital information is an important asset in the corporate world. Organizations typically devise policies and guidelines to help employees protect the security of such information. Complying with these policies can often be confusing and difficult and may obstruct the task at hand, thus potentially leading employees to circumvent or ignore these policies. Commercial technology and training prog...

متن کامل

the use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sustainability

سال: 2021

ISSN: ['2071-1050']

DOI: https://doi.org/10.3390/su13116077