Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior

نویسندگان

  • Felix Haeussinger
  • Johann Kranz
چکیده

Information security awareness (ISA) is referred to as a state of consciousness and knowledge about security issues and is frequently found to impact security compliant behavior. However, to date we know little about the factors influencing ISA and its mediating effect on behavior. Our study addresses these gaps. We propose a research model that studies ISA’s institutional, individual, and environmental antecedents and investigates the mediating role of ISA. The model was empirically tested with survey data from 475 employees. The model explains a substantial proportion of the variance of ISA (.50) and intention to comply (.41). The results imply that the provision of security policies and employees’ knowledge on information systems are the most influential antecedents of ISA. The study shows that ISA mediates the relationship between ISA’s antecedents and behavioral intention. The findings will be useful for stakeholders interested in encouraging employees’ information security policy compliant behavior.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding the Antecedents of Information Security Awareness - An Empirical Study

Employees’ information security awareness (ISA) is a key antecedent of information security behavior. However, to date we know very little about the factors that are responsible for some employees having a higher level of ISA than others. Our study addresses this gap. We propose a model that comprises institutional, individual, and environmental factors preceding ISA. The model was empirically ...

متن کامل

Antecedents of Employees' Information Security Awareness - Review, synthesis, and Directions for Future Research

Living in a digital age, where all kinds of information are accessible electronically at all times, organizations worldwide struggle to keep their information assets secure. Interestingly, the majority of organizational information systems security (ISS) incidents are the direct or indirect result of human errors. To explore how organizations can defend themselves against harmful ISS behaviour,...

متن کامل

Mind the Threat! A Qualitative Case Study on Information Security Awareness Programs in European Banks

This case study aims to analyze the dynamics in banks, which implement an information security awareness (ISA) program. In detail, we describe ISA programs in three major banks from three Central Eastern European countries. We examine how the specific context shapes different phases of its implementation. The contextual differentiation helps us to discover how specific characteristics of ISA pr...

متن کامل

Investigating the Effects of Psychological Capital on Evidence-based Clinical Practice of Nurses in Dealing With COVID-19 Patients: The Mediating Role of Psychological Security

Objectives: Given the outbreak of COVID-19 pandemic and its adverse effects on social psychological health, especially nurses, psychological empowerment of nurses can increase their psychological security and improve their clinical performance during critical situations. This study aims to investigate the relationship between nurses’ psychology capital and their clinical performance, with a foc...

متن کامل

Perceptions of Information Security at the Workplace: Linking Information Security Climate to Compliant Behavior

A large number of information security breaches at the workplace result from employees’ failure to comply with organizational information security guidelines. Recent surveys report that 78% of computer attacks appear in the form of viruses embedded in email attachments. Employees who open e-mail attachments from unknown sources risk infecting their own computers as well as other computers shari...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013