Identifying Factors that Influence Corporate Information Security Behavior

نویسندگان

  • Santos M. Galvez
  • Indira R. Guzman
چکیده

In this paper, we present a social/behavioral meta-study of good corporate information security practices. The research model combines social cognitive theory and control theory in order to explain the individual and environmental factors that influence corporate information security behavior. The model includes employees’ beliefs about their abilities to competently use computer information security tools in the determination of effective information security practices within organizations. We present the definition and operationalization of constructs such as information security awareness and information security practice as the dependent variable and then support within the organization, encouragement by others, others’ use as environmental factors in the information security context; and finally, self-efficacy and outcome expectations as the independent variables of the model. This research model is aimed to develop an effective audit and recommendation model for organizations that are looking to make significant improvements in their information security profiles.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

The Role of Cognitive Biases in scientific information behavior of postgraduate students in Kharazmi University

Background and Aim: considering the significance of cognitive and psychological factors in human-information interaction, this study investigates the role of cognitive biases in academic information behavior of postgraduate students at Kharazmi University. Methodology:  this qualitative research used classic grounded theory as the method. The research population included all postgraduate of Kha...

متن کامل

PROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

متن کامل

Identifying customer preferences in using e-banking services

Clients are the vital artery of every industry and business. Maintaining these customers is one of the most important tasks of any business, especially banks.  The  specific needs  of  customers and  the increasing compe- tition in the banking services market have led banks to create structures that can respond flexibly to these needs. Obviously, one of the important points is that moving to th...

متن کامل

Identifying customer preferences in using e-banking services

Clients are the vital artery of every industry and business. Maintaining these customers is one of the most important tasks of any business, especially banks.  The  specific needs  of  customers and  the increasing compe- tition in the banking services market have led banks to create structures that can respond flexibly to these needs. Obviously, one of the important points is that moving to th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009