메뉴 건너뛰기




Volumn , Issue , 2019, Pages 103-122

Unpacking security policy compliance: The motivators and barriers of employees' security behaviors

Author keywords

[No Author keywords available]

Indexed keywords

PERSONNEL; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 85075940742     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (66)

References (59)
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • 1999
    • Adams, A. and Sasse, M.A. 1999. Users are not the enemy. Communications of the ACM. 42, 12 (1999), 41-46.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 4
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Jun. 2007
    • Albrechtsen, E. 2007. A qualitative study of users' view on information security. Computers & Security. 26, 4 (Jun. 2007), 276-289.
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 5
    • 0017472917 scopus 로고
    • Self-efficacy: Toward a unifying theory of behavioral change
    • 1977
    • Bandura, A. 1977. Self-efficacy: toward a unifying theory of behavioral change. Psychological review. (1977).
    • (1977) Psychological Review
    • Bandura, A.1
  • 6
    • 85011237933 scopus 로고    scopus 로고
    • I wanna tell you a story”: Exploring the application of vignettes in qualitative research with children and young people
    • 2000
    • Barter, C. and Renold, E. 2000. “I wanna tell you a story”: exploring the application of vignettes in qualitative research with children and young people. International Journal of Social Research Methodology. 3, 4 (2000), 307-323.
    • (2000) International Journal of Social Research Methodology , vol.3 , Issue.4 , pp. 307-323
    • Barter, C.1    Renold, E.2
  • 7
    • 0038491740 scopus 로고    scopus 로고
    • The use of vignettes in qualitative research
    • 1999
    • Barter, C. and Renold, E. 1999. The use of vignettes in qualitative research. Social research update. 25, 9 (1999), 1-6.
    • (1999) Social Research Update , vol.25 , Issue.9 , pp. 1-6
    • Barter, C.1    Renold, E.2
  • 9
    • 84924405869 scopus 로고    scopus 로고
    • Cyber security in the workplace: Understanding and promoting behaviour change
    • 2013
    • Blythe, J.M. 2013. Cyber security in the workplace: Understanding and promoting behaviour change. Proceedings of CHItaly 2013 Doctoral Consortium (2013), 92-101.
    • (2013) Proceedings of CHItaly 2013 Doctoral Consortium , pp. 92-101
    • Blythe, J.M.1
  • 12
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • 2010
    • Bulgurcu, B., Cavusoglu, H. and Benbasat, I. 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly. 34, 3 (2010), 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 13
    • 84873421010 scopus 로고    scopus 로고
    • Applying the Theory of planned behaviour to predicting online safety behaviour
    • Feb. 2013
    • Burns, S. and Roberts, L. 2013. Applying the Theory of Planned Behaviour to predicting online safety behaviour. Crime Prevention and Community Safety. 15, 1 (Feb. 2013), 48-64.
    • (2013) Crime Prevention and Community Safety , vol.15 , Issue.1 , pp. 48-64
    • Burns, S.1    Roberts, L.2
  • 15
    • 84887485725 scopus 로고    scopus 로고
    • Using the health belief model to explore users' perceptions of “being safe and secure” in the world of technology mediated financial transactions
    • Feb. 2014
    • Davinson, N. and Sillence, E. 2014. Using the health belief model to explore users' perceptions of “being safe and secure” in the world of technology mediated financial transactions. International Journal of Human-Computer Studies. 72, 2 (Feb. 2014), 154-168.
    • (2014) International Journal of Human-Computer Studies , vol.72 , Issue.2 , pp. 154-168
    • Davinson, N.1    Sillence, E.2
  • 16
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    • 2007
    • Dinev, T. and Hu, Q. 2007. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies. Journal of the Association for Information System. 8, 7 (2007), 386-408.
    • (2007) Journal of the Association for Information System , vol.8 , Issue.7 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 17
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • 2004
    • Dourish, P., Grinter, R.E., De La Flor, J.D. and Joseph, M. 2004. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing. 8, 6 (2004), 391-401.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.E.2    De La Flor, J.D.3    Joseph, M.4
  • 18
    • 8144226845 scopus 로고    scopus 로고
    • Elicitation studies and the theory of planned behavior: A systematic review of exercise beliefs
    • Jan. 2005
    • Downs, D.S. and Hausenblas, H.A. 2005. Elicitation studies and the theory of planned behavior: a systematic review of exercise beliefs. Psychology of Sport and Exercise. 6, 1 (Jan. 2005), 1-31.
    • (2005) Psychology of Sport and Exercise , vol.6 , Issue.1 , pp. 1-31
    • Downs, D.S.1    Hausenblas, H.A.2
  • 19
    • 84970405810 scopus 로고
    • The vignette technique in survey research
    • 1987
    • Finch, J. 1987. The vignette technique in survey research. Sociology. 21, 1 (1987), 105-114.
    • (1987) Sociology , vol.21 , Issue.1 , pp. 105-114
    • Finch, J.1
  • 20
    • 33746766203 scopus 로고    scopus 로고
    • The role of theory in developing effective health communications
    • 2006
    • Fishbein, M. and Cappella, J. 2006. The role of theory in developing effective health communications. Journal of Communication. 56, (2006), 1-17.
    • (2006) Journal of Communication , vol.56 , pp. 1-17
    • Fishbein, M.1    Cappella, J.2
  • 21
    • 84965799654 scopus 로고
    • Impression management in organizations
    • 1988
    • Gardner, W. and Martinko, M. 1988. Impression management in organizations. Journal of management. 14, 2 (1988), 321-338.
    • (1988) Journal of Management , vol.14 , Issue.2 , pp. 321-338
    • Gardner, W.1    Martinko, M.2
  • 22
    • 70349151365 scopus 로고    scopus 로고
    • Consumer motivations in taking action against spyware: An empirical investigation
    • 2009
    • Gurung, A., Luo, X. and Liao, Q. 2009. Consumer motivations in taking action against spyware: an empirical investigation. Information Management & Computer Security. 17, 3 (2009), 276-289.
    • (2009) Information Management & Computer Security , vol.17 , Issue.3 , pp. 276-289
    • Gurung, A.1    Luo, X.2    Liao, Q.3
  • 23
    • 0038925782 scopus 로고
    • Motivation through the design of work: Test of a theory
    • 1976
    • Hackman, J. and Oldham, G. 1976. Motivation through the design of work: Test of a theory. Organizational Behavior and Human Performance. 16, 2 (1976), 250-279.
    • (1976) Organizational Behavior and Human Performance , vol.16 , Issue.2 , pp. 250-279
    • Hackman, J.1    Oldham, G.2
  • 24
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • May 2009
    • Herath, T. and Rao, H.R. 2009. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems. 47, 2 (May 2009), 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 25
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Apr. 2009
    • Herath, T. and Rao, H.R. 2009. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems. 18, 2 (Apr. 2009), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 26
    • 0032393265 scopus 로고    scopus 로고
    • Considering the vignette technique and its application to a study of drug injecting and HIV risk and safer behaviour
    • 1998
    • Hughes, R. 1998. Considering the vignette technique and its application to a study of drug injecting and HIV risk and safer behaviour. Sociology of Health and Illness. 20, (1998), 381-400.
    • (1998) Sociology of Health and Illness , vol.20 , pp. 381-400
    • Hughes, R.1
  • 27
    • 0026830136 scopus 로고
    • Validity threats in scheduled semistructured research interviews
    • 1992
    • Hutchinson, S. and Wilson, H.S. 1992. Validity threats in scheduled semistructured research interviews. Nursing Research. 41, 2 (1992), 117-119.
    • (1992) Nursing Research , vol.41 , Issue.2 , pp. 117-119
    • Hutchinson, S.1    Wilson, H.S.2
  • 29
    • 84887852395 scopus 로고    scopus 로고
    • Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
    • 2014
    • Ifinedo, P. 2014. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information and Management. 51, 1 (2014), 69-79.
    • (2014) Information and Management , vol.51 , Issue.1 , pp. 69-79
    • Ifinedo, P.1
  • 30
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    • Nov. 2011
    • Ifinedo, P. 2011. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security. 31, 1 (Nov. 2011), 83-95.
    • (2011) Computers & Security , vol.31 , Issue.1 , pp. 83-95
    • Ifinedo, P.1
  • 33
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behavior: An empircal study
    • 2010
    • Johnston, A.C. and Warkentin, M. 2010. Fear appeals and information security behavior: An empircal study. MIS Quarterly. 34, 3 (2010), 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 34
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • May 2004
    • Kotulic, A.G. and Clark, J.G. 2004. Why there aren't more information security research studies. Information & Management. 41, 5 (May 2004), 597-607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 35
    • 56049103535 scopus 로고    scopus 로고
    • Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls
    • Dec. 2008
    • Kumar, N., Mohan, K. and Holowczak, R. 2008. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls. Decision Support Systems. 46, 1 (Dec. 2008), 254-264.
    • (2008) Decision Support Systems , vol.46 , Issue.1 , pp. 254-264
    • Kumar, N.1    Mohan, K.2    Holowczak, R.3
  • 36
    • 51749090174 scopus 로고    scopus 로고
    • Keeping our network safe: A model of online protection behaviour
    • Sep. 2008
    • Lee, D., Larose, R. and Rifon, N. 2008. Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology. 27, 5 (Sep. 2008), 445-454.
    • (2008) Behaviour & Information Technology , vol.27 , Issue.5 , pp. 445-454
    • Lee, D.1    Larose, R.2    Rifon, N.3
  • 37
    • 40049109336 scopus 로고    scopus 로고
    • An empirical investigation of anti-spyware software adoption: A multitheoretical perspective
    • 2008
    • Lee, Y. and Kozar, K. 2008. An empirical investigation of anti-spyware software adoption: A multitheoretical perspective. Information & Management. 45, 2 (2008), 109-119.
    • (2008) Information & Management , vol.45 , Issue.2 , pp. 109-119
    • Lee, Y.1    Kozar, K.2
  • 38
    • 67650141420 scopus 로고    scopus 로고
    • Theory of reasoned action, theory of planned behavior, and the integrated behavioral model
    • K. Glanz, B. Rimer, and K. Viswanath, eds. Jossey Bass
    • Montaño, D.E. and Kasprzyk, D. 2008. Theory of reasoned action, theory of planned behavior, and the integrated behavioral model. Health behavior and health education: theory, research, and practice. K. Glanz, B. Rimer, and K. Viswanath, eds. Jossey Bass. 67-96.
    • (2008) Health Behavior and Health Education: Theory, Research, and Practice , pp. 67-96
    • Montaño, D.E.1    Kasprzyk, D.2
  • 39
    • 80053545071 scopus 로고    scopus 로고
    • A socio-behavioral study of home computer users' intention to practice security
    • 2005
    • Ng, B. and Rahim, M. 2005. A socio-behavioral study of home computer users' intention to practice security. PACIS 2005 Proceedings (2005), 234-247.
    • (2005) PACIS 2005 Proceedings , pp. 234-247
    • Ng, B.1    Rahim, M.2
  • 40
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • Mar. 2009
    • Ng, B.-Y., Kankanhalli, A. and Xu, Y. 2009. Studying users' computer security behavior: A health belief perspective. Decision Support Systems. 46, 4 (Mar. 2009), 815-825.
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.3
  • 45
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R.W. 1975. A protection motivation theory of fear appeals and attitude change. Journal of Psychology. 91, (1975), 93-114.
    • (1975) Journal of Psychology , vol.91 , Issue.1975 , pp. 93-114
    • Rogers, R.W.1
  • 46
    • 0034068688 scopus 로고    scopus 로고
    • Compliance with eye patching in children and its psychosocial effects: A qualitative application of protection motivation theory
    • 2000
    • Searle, A., Vedhara, K., Norman, P., Frost, A. and Harrad, R. 2000. Compliance with eye patching in children and its psychosocial effects: a qualitative application of protection motivation theory. Psychology, Health & Medicine. 5, 1 (2000), 43-54.
    • (2000) Psychology, Health & Medicine , vol.5 , Issue.1 , pp. 43-54
    • Searle, A.1    Vedhara, K.2    Norman, P.3    Frost, A.4    Harrad, R.5
  • 47
    • 77954785765 scopus 로고    scopus 로고
    • Multicultural vignettes for teacher preparation
    • 2002
    • Seguin, C.A. and Ambrosio, A. 2002. Multicultural vignettes for teacher preparation. Multicultural Perspectives. 4, 4 (2002), 10-16.
    • (2002) Multicultural Perspectives , vol.4 , Issue.4 , pp. 10-16
    • Seguin, C.A.1    Ambrosio, A.2
  • 48
    • 85006082697 scopus 로고    scopus 로고
    • Intention - Behavior relations: A conceptual and empirical review
    • 2002
    • Sheeran, P. 2002. Intention - Behavior Relations: A Conceptual and Empirical Review. European Review of Social Psychology. 12, 1 (2002), 1-36.
    • (2002) European Review of Social Psychology , vol.12 , Issue.1 , pp. 1-36
    • Sheeran, P.1
  • 49
    • 84891789669 scopus 로고    scopus 로고
    • Employees' adherence to information security policies: An exploratory field study
    • Dec. 2014
    • Siponen, M., Mahmood, M.A. and Pahnila, S. 2014. Employees' adherence to information security policies: An exploratory field study. Information & Management. 51, 2 (Dec. 2014), 217-224.
    • (2014) Information & Management , vol.51 , Issue.2 , pp. 217-224
    • Siponen, M.1    Mahmood, M.A.2    Pahnila, S.3
  • 52
    • 79960049010 scopus 로고    scopus 로고
    • Framework analysis: A qualitative methodology for applied policy research
    • 2009
    • Srivastava, A. and Thomson, S. 2009. Framework analysis: a qualitative methodology for applied policy research. Joaag. (2009).
    • (2009) Joaag
    • Srivastava, A.1    Thomson, S.2
  • 53
  • 54
    • 33750923703 scopus 로고    scopus 로고
    • Cultivating an organizational information security culture
    • von and 2006
    • Thomson, K., Solms, R. von and Louw, L. 2006. Cultivating an organizational information security culture. Computer Fraud & Security. (2006).
    • (2006) Computer Fraud & Security
    • Thomson, K.1    Solms, R.2    Louw, L.3
  • 55
    • 84861093724 scopus 로고    scopus 로고
    • Motivating IS security compliance: Insights from habit and protection motivation theory
    • May 2012
    • Vance, A., Siponen, M. and Pahnila, S. 2012. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management. 49, 3-4 (May 2012), 190-198.
    • (2012) Information & Management , vol.49 , Issue.3-4 , pp. 190-198
    • Vance, A.1    Siponen, M.2    Pahnila, S.3
  • 56
    • 0023717136 scopus 로고
    • Self-efficacy: The third factor besides attitude and subjective norm as a predictor of behavioural intentions
    • de, 1988
    • Vries, H. de, Dijkstra, M. and Kuhlman, P. 1988. Self-efficacy: the third factor besides attitude and subjective norm as a predictor of behavioural intentions. Health education research. (1988).
    • (1988) Health Education Research
    • Vries, H.1    Dijkstra, M.2    Kuhlman, P.3
  • 58
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Sep. 2008
    • Workman, M., Bommer, W. and Straub, D. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior. 24, 6 (Sep. 2008), 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.