Effects of Team Collaboration on Sharing Information Security Advice: Insights from Network Analysis
نویسندگان
چکیده
Active sharing of information security advice among the employees has undeniable implications for developing a sustainable security environment. This research examines this topic from the network perspective, and focuses on the work relationships that promote sharing security advice. Exponential random graph modeling technique was employed to evaluate the relationship between team collaborative activities and sharing security advice. The findings revealed that those who share security advice also tend to give workand IT-related knowledge. Moreover, employees who have similar tenure tend to exchange security advice with each other more. Furthermore, the network of sharing security advice is transitive and has a tendency to form separate clusters. Security managers are suggested to take into account the research findings to identify key employees who frequently share security advice in the workplace and devise appropriate strategies to manage them. KEywoRdS Behavioural Security Network, Exponential Random Graph Modeling, Information Security Behaviour, Information Security Management, Social Network Analysis INTRodUCTIoN Protecting information security has been a critical business objective of modern organisations (Crossler et al., 2013). However, this objective is also commonly perceived by the employees as a non-task that is irrelevant to their daily work, thus discourages their security duties and actions (M. Siponen & Vance, 2010; von Solms & von Solms, 2004). Worse still, employees facing with a dilemma of achieving job performance and being required to comply with security policy were even found to engage in security violations in exchange for getting their main job done (Guo, Yuan, Archer, & Connelly, 2011). Therefore, the end-users have remained as a weakest link in the security chain, and organisations are advised to leverage the end-users’ security awareness to prevent information security incidents (Bulgurcu, Cavusoglu, & Benbasat, 2010; Safa & Von Solms, 2016; Sommestad, Karlzén, & Hallberg, 2015). Among a plethora of the factors that contribute to end-users’ security compliance, sharing information security advice is an emerging topic that holds important implications (Dang-Pham, Pittayachawan, & Bruno, 2016; Safa & Von Solms, 2016; Tamjidyamcholo, Bin Baba, Shuib, & Rohani, 2014). For instance, Tamjidyamcholo et al. (2014) discussed that sharing security advice between organisations may reduce their expenses in information security. At the individual-level, active sharing security advice in a workplace helps to diffuse security awareness as well as prevent re-inventing the same security practices, so that security managers can better invest their time and budget in more important matters (Dang-Pham et al., 2016; Safa & Von Solms, 2016).
منابع مشابه
Authorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملInformation sharing systems and teamwork between sub-teams: a mathematical modeling perspective
Teamwork contributes to a considerable improvement in quality and quantity of the ultimate outcome. Collaboration and alliance between team members bring a substantial progress for any business. However, it is imperative to acquire an appropriate team since many factors must be considered in this regard. Team size may represent the effectiveness of a team and it is of paramount importance to de...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملTowards a collaborative learning environment for children's pain management: leveraging an online discussion forum
Effective management of pediatric pain requires pro-active and effective collaboration between health practitioners from a variety of health disciplines. This paper investigates the merits of a collaborative learning environment to address the knowledge gaps experienced by a community of pediatric pain practitioners. We present a knowledge management solution that leverages an online discussion...
متن کاملتأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراکگذاری اطلاعات در شبکههای اجتماعی موبایل: نقش تعدیلکننده متغیر جنسیت
The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IRMJ
دوره 30 شماره
صفحات -
تاریخ انتشار 2017