Information Security Behavior: Towards Multi-Stage Models
نویسندگان
چکیده
In order to ensure that employees abide by their organizations’ Information Security Policies (ISP), a number of information security policy compliance measures have been proposed in the past. If different factors can explain/predict the information security behavior of those employees who do know the ISP and of those who do not know the ISP, such as is suggested by stage theories, and the existing studies do not control for this issue, then the practical relevance of the existing models will be decreased. In order to test whether different factors explain/predict the information security behavior of those employees who do know the ISP and of those who do not know the ISP, we designed a study using the Protection Motivation Theory (PMT) as the baseline theory. Employees’ ISP knowledge was tested by asking a few questions related to their organization’s ISP. We divided the data (N=513) into that related to a low knowledge group (regarding the organizations’ ISP) and that of a high knowledge group. The results show that the findings between the low knowledge group and the high knowledge group differ substantially. Our results provide an explanation for the inconsistent results in previous IS security research.
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملPlace of Internet in Health information seeking behavior: Case of young Internet users in Shiraz
Background and Aim: Nowadays, Internet is known as an attractive source of health information to manage individual's health. Given the importance of it, this study examined the role of Internet in health information seeking behavior among young people in Shiraz. Method: This research was a survey which target population were youth Internet users in the city of Shiraz. A sample of 400 we...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملDesign of Multi-Stage Fuzzy PID Bundled Artificial Bee Colony for Multi-machine PSS
This paper presents a new strategy based on Multi-stage Fuzzy (MSF) PID controller based on Artificial Bee Colony (ABC) for damping Power System Stabilizer (PSS) in multi-machine environment. The recent studies in artificial intelligence demonstrated that the ABC optimization is strong intelligent method in complicated stability problems. Also, finding the parameters of PID controller in power ...
متن کاملDesign of Multi-Stage Fuzzy PID Bundled Artificial Bee Colony for Multi-machine PSS
This paper presents a new strategy based on Multi-stage Fuzzy (MSF) PID controller based on Artificial Bee Colony (ABC) for damping Power System Stabilizer (PSS) in multi-machine environment. The recent studies in artificial intelligence demonstrated that the ABC optimization is strong intelligent method in complicated stability problems. Also, finding the parameters of PID controller in power ...
متن کامل