Exploring the Influences of Implementation Intention on Information Security Behaviors

نویسندگان

  • Gen-Yih Liao
  • Chia-Min Wang
چکیده

ABSTACT Although information security knowledge is spreading and management tools are improving, information security incidents remain widely heard. Studies have investigated information security behaviors through motivational theories like the Theory of Planned Behavior. Since implementation intentions are considered as a behavior changing technique that may overcome goal deviations, this paper attempts to explore information security behaviors from the volitional perspective. Synthesizing the findings of twelve implementation intention studies, the proposed research model postulates that implementation intention intervention may affect information security behaviors. Besides, the moderating effects of two factors are included in the research model: difficulty of information security behaviors and strength of commitment to the goal intention. This research-in-progress paper describes the experimental methodology and provides instruments to validate the proposed model. The results are expected to establish the importance of action plans in improving information security behaviors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

متن کامل

Exploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

متن کامل

اثربخشی مداخله آموزشی مبتنی بر روش همسان بر میزان آگاهی، نگرش و قصد رفتاری مرتبط با ایدز در دانش آموزان دختر دبیرستان های منطقه 14 شهر تهران

Background and Objectives: AIDS is a health problem worldwide, especially in developing countries. Therefore, the aim of this study was the survey of the effectiveness of educational intervention based on peer education on knowledge, attitude and behavioral intention related to HIV/AIDS in high school female students in region 14 of Tehran, Iran. Materials and Methods: In this quasi-experime...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

Predicting Insider's Malicious Security Behaviours: A General Strain Theory-Based Conceptual Model

Insider’s malicious information security behaviours have always been a persistent problem and requiring urgent mitigation solutions. More recently, seminal calls for future research suggested exploring the influences of employee-workplace interaction and pre-kinetic events such as organisational injustice since they are argued to hold potential impacts on the insider’s intention to perform abus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011