Developing a human activity model for insider IS security breaches using action design research

6Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Insider security breaches in organizations have been identified as a pressing problem for academics and practitioners. The literature generally addresses this problem by focusing on the compliance of human behavior to stated policy or the conformance with organizational culture. The cultural stance and resultant activities of organizational insiders are key determinants of information security. However, whilst compliance with security policies and regulations is of great importance, the very structure of human activities that facilitates or hinders such compliance have seldom appeared in the literature. In this paper we present a human activity model that captures different aspects of a security culture. The model elucidates the patterns of behavior in organizations. Applying the model before and after an insider security breach allows us to make salient, critical areas that need attention.

Cite

CITATION STYLE

APA

Dhillon, G., Samonas, S., & Etudo, U. (2016). Developing a human activity model for insider IS security breaches using action design research. In IFIP Advances in Information and Communication Technology (Vol. 471, pp. 49–61). Springer New York LLC. https://doi.org/10.1007/978-3-319-33630-5_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free