The assumptions and profiles behind IT security behavior

2Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

Among the major IT security challenges facing organizations is non-malicious employee behavior that nevertheless poses significant threats to an organization's IT security. Using a grounded theory methodology, this paper finds that organizational security behaviors are inherently related to employee assumptions regarding the importance of IT security policy compliance and regarding the reason why IT security measures are implemented. Analyzing these assumptions uncovers four profiles of perspectives concerning IT security: the IT Security Indulgence, the IT Security Overindulgence, the IT Knows Best and the IT Security Disconnect profiles. These profiles are useful in understanding employee IT security behaviors and may help IT departments in developing more effective strategies designed to ensure policy compliance.

Cite

CITATION STYLE

APA

Balozian, P., & Leidner, D. (2017). The assumptions and profiles behind IT security behavior. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2017-January, pp. 4987–4996). IEEE Computer Society. https://doi.org/10.24251/hicss.2017.605

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free