A Common Description and Measures for Attitude in Information Security for Organizations

2019 ◽  
Vol 1 (2) ◽  
pp. 1-11
Author(s):  
Nooredin Etezady

Understanding employee's security behavior is required before effective security policies and training materials can be developed. The Anti-virus software, secure systems design methods, information management standards, and information systems security policies; which have been developed and implemented by many organizations; have not been successfully adopted. Information systems research is encompassing social aspects of systems research more and more in order to explain user behavior and improve technology acceptance. Theory of planned behavior (TPB) based on attitude, subjective norm, and perceived behavioral control constructs, considers intentions as cognitive antecedents of actions or behavior. This study reviews various research on attitude and finds the most common measures for attitude, which can be used in organizations to develop a method to influence employees' attitude positively with the goal of inducing positive security behavior. Further, a conceptual model for operationalizing the obtained measures for enhancing information security in organizations is presented.

2011 ◽  
pp. 533-543
Author(s):  
James Yao ◽  
John Wang ◽  
Qiyang Chen ◽  
June Lu

Information systems were developed in early 1960s to process orders, billings, inventory controls, payrolls, and accounts payables. Soon information systems research began. Harry Stern started the “Information Systems in Management Science” column in Management Science journal to provide a forum for discussion beyond just research papers (Banker & Kauffman, 2004). Ackoff (1967) led the earliest research on management information systems for decision-making purposes and published it in Management Science. Gorry and Scott Morton (1971) first used the term decision support systems (DSS) in a paper and constructed a framework for improving management information systems. The topics on information systems and DSS research diversifies. One of the major topics has been on how to get systems design right.


2017 ◽  
Vol 19 (3/4) ◽  
pp. 228-256 ◽  
Author(s):  
Dominik Jung ◽  
Marc Adam ◽  
Verena Dorner ◽  
Anuja Hariharan

Purpose Human lab experiments have become an established method in information systems research for investigating user behavior, perception and even neurophysiology. The purpose of this paper is to facilitate experimental research by providing a practical guide on how to implement and conduct lab experiments in the freely available experimental platform Brownie. Design/methodology/approach Laying the groundwork of the tutorial, the paper first provides a brief overview of common design considerations for lab experiments and a generic session framework. Building on the use case of the widely used trust game, the paper then covers the different stages involved in running an experimental session and maps the conceptual elements of the study design to the implementation of the experimental software. Findings The paper generates findings on how computerized lab experiments can be designed and implemented. Furthermore, it maps out the design considerations an experimenter may take into account when implementing an experiment and organizing it along a session structure (e.g. participant instructions, individual and group interaction, state and trait questionnaires). Originality/value The paper reduces barriers for researchers to engage in experiment implementation and replication by providing a step-by-step tutorial for the design and implementation of human lab experiments.


2018 ◽  
Vol 9 (3) ◽  
pp. 127-144
Author(s):  
Frederick Pobee ◽  
Daniel Opoku

Information systems (IS) have become an integral part of many organizations as they depend on it to execute their critical business function. The purpose of this research was to explore the enablers and inhibitors of information systems disaster recovery planning in organizations in the Ghanaian banking sector. In order to achieve this purpose, the protection motivation theory and the theory of planned behavior was used as the theoretical lens for this study. Eight hypotheses were developed to test the research conceptualization. Data analysis was performed using SPSS version 20.0. Using a survey of 207 managers in the Ghanaian banking sector, this article shows the factors such as perceived vulnerability, perceived severity, response efficacy, self-efficacy, attitude, subjective norms and perceived behavioral control positively influences motivation and intention to develop an information systems disaster recovery plan in Ghanaian banking industries.


2020 ◽  
Vol 12 (8) ◽  
pp. 3163
Author(s):  
Amanda M. Y. Chu ◽  
Mike K. P. So

This article examines the occurrences of four types of unethical employee information security behavior—misbehavior in networks/applications, dangerous Web use, omissive security behavior, and poor access control—and their relationships with employees’ information security management efforts to maintain sustainable information systems in the workplace. In terms of theoretical contributions, this article identifies and develops reliable and valid instruments to measure different types of unethical employee information security behavior. In addition, it investigates factors affecting different types of such behavior and how such behavior can be used to predict employees’ willingness to report information security incidents. In terms of managerial contributions, the article suggests that information security awareness programs and perceived punishment have differential effects on the four types of unethical behavior and that certain types of unethical information security behavior exert negative effects on employees’ willingness to report information security incidents. The findings will help managers to derive better security rules and policies, which are important for business continuity.


2015 ◽  
Vol 33 (1) ◽  
pp. 120-135 ◽  
Author(s):  
Eunil Park ◽  
Jungyeon Sung ◽  
Kwangsu Cho

Purpose – This paper aims to explore users’ perception of, and then intention toward using, e-book devices as new reading devices, based upon an integrated technology acceptance model (TAM), reading engagement based upon flow theory and readability. The recent introduction of e-book devices has drastically changed the way people access and use reading content. However, few studies have explored the impact of reading experience on acceptance of e-book devices. Design/methodology/approach – A total of 219 participants participated in a survey after using e-book devices to analyze the research model. Findings – This study confirmed the crucial roles played by viewing experience, perceived mobility, perceived behavioral control, skill and readability. Also perceived usefulness and text satisfaction were found to have a positive and significant association with acceptance of e-book devices. Research limitations/implications – Implications and suggestions for researchers and manufacturers are also addressed in the present study. Originality/value – The current study focused on how actual reading experiences using e-book devices influences acceptance of e-book devices, through the triangular integrated model of TAM, reading engagement and readability features, and investigating users’ reading experience on the basis of responses to the characteristics of e-book devices.


Author(s):  
Yan Chen ◽  
Dennis F. Galletta ◽  
Paul Benjamin Lowry ◽  
Xin (Robert) Luo ◽  
Gregory D. Moody ◽  
...  

A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unable to address the threat and, feeling overwhelmed, focus only on controlling their emotions, merely making themselves feel better. Based on our findings, organizations can enhance their security by understanding the “tipping point” where employees’ focus likely changes from problem-solving to emotion appeasement, and instead push them into a more constructive direction.Yan Chen is an associate professor at Florida International University. She received her PhD in management information systems from University of Wisconsin–Milwaukee. Her research focuses on information security management, online fraud, privacy, and social media. She has published more than 30 research papers in refereed academic journals and conference proceedings.Dennis F. Galletta is a LEO awardee, fellow, and former president of the Association for Information Systems and professor at University of Pittsburgh since 1985. He has published 108 articles and four books. He is a senior editor at MIS Quarterly and an editorial board member at the Journal of Management Information Systems, and has been on several other boards.Paul Benjamin Lowry is the Suzanne Parker Thornhill Chair Professor in Business Information Technology at the Pamplin College of Business at Virginia Tech. He has published more than 135 journal articles. His research areas include organizational and behavioral security and privacy; online deviance and harassment, and computer ethics; human–computer interaction, social media, and gamification; and decision sciences, innovation, and supply chains.Xin (Robert) Luo is Endowed Regent’s Professor and full professor of MIS at the University of New Mexico. His research has appeared in leading information systems journals, and he serves as an associate editor for the Journal of the Association for Information Systems, Decision Sciences Journal, Information & Management, Electronic Commerce Research, and the Journal of Electronic Commerce Research.Gregory D. Moody is currently Lee Professor of Information Systems at the University of Nevada Las Vegas, and director of the cybersecurity graduate program. His interests include information systems security and privacy, e-business, and human–computer interaction. He is currently a senior editor for the Information Systems Journal and Transactions on Human-Computer Interaction.Robert Willison is a professor of management at Xi’an Jiaotong–Liverpool University. He received his PhD in information systems from the London School of Economics. His research focuses on insider computer abuse, information security policy compliance/noncompliance, software piracy, and cyber-loafing. His research has appeared in refereed academic journals such as MIS Quarterly, Journal of the Association for Information Systems, Information Systems Journal, and others.


2016 ◽  
Vol 12 (1) ◽  
pp. 1-23 ◽  
Author(s):  
Ioannis Karavasilis ◽  
Vasiliki G. Vrana ◽  
Kostas Zafiropoulos

E-government in Greece lacks a customer-centric view in its implementation. Government is driving its development agenda and investment on electronic services without measuring what increases customers' willingness to adopt offered services. The study has taken a lead in understanding the factors that affect e-government adoption by teachers in Greece. It uses constructs from the Technology Acceptance Model (TAM), the theoretical extension of the TAM (TAM2), Diffusion of Innovation (DOI) and integrates the constructs of perceived behavioral control, trust in e-government, perceived risk, personal innovativeness and awareness in a model. The validated model offers a starting point for the investigation of factors affecting the adoption of e-government services and can be extended by using domain-specific constructs to fit all Greek governmental organizations.


Author(s):  
Mohammad H. Pakravan ◽  
Nordica MacCarty

Understanding and integrating a user’s decision-making process into design and implementation strategies for clean energy technologies may lead to higher product adoption rates and ultimately increased impacts, particularly for those products that require a change in habit or behavior. To evaluate the key attributes that formulate a user’s decision-making behavior to adopt a new clean technology, this study presents the application of the Theory of Planned Behavior, a method to quantify the main psychological attributes that make up a user’s intention for health and environmental behaviors. This theory was applied to the study of biomass cookstoves. Surveys in two rural communities in Honduras and Uganda were conducted to evaluate households’ intentions regarding adoption of improved biomass cookstoves. Multiple ordered logistic regressions method presented the most statistically significant results for the collected data of the case studies. Baseline results showed users had a significant positive mindset to replace their traditional practices. In Honduras, users valued smoke reduction more than other attributes and in average the odds for a household with slightly higher attitude toward reducing smoke emissions were 2.1 times greater to use a clean technology than someone who did not value smoke reduction as much. In Uganda, less firewood consumption was the most important attribute and on average the odds for households were 1.9 times more to adopt a clean technology to save fuel than someone who did not value fuelwood saving as much. After two months of using a cookstove, in Honduras, households’ perception of the feasibility of replacing traditional stoves, or perceived behavioral control, slightly decreased suggesting that as users became more familiar with the clean technology they perceived less hindrances to change their traditional habits. Information such as this could be utilized for design of the technologies that require user behavior changes to be effective.


2017 ◽  
Vol 57 (6) ◽  
pp. 792-810 ◽  
Author(s):  
Tsung Hung Lee ◽  
Fen-Hauh Jan

This study aims to examine an ecotourism behavioral model using environmental attitude, subjective norms, perceived behavioral control, perceived ecotourism usefulness, biospheric value, ecotourism self-identity, ecotourism behavioral intention, and ecotourism behavior among nature-based tourists. The analysis tested ten hypotheses and integrated the theory of planned behavior, the technology acceptance model, value-belief-norm theory, and social identity theory to provide an integrated ecotourism behavioral model for four important Taiwanese nature-based tourism destinations. This integrated framework provides an approach to creating critical insights for nature-based tourism researchers and managers to accurately grasp the factors that influence ecotourism behavior. Managers of nature-based tourism destinations should offer ecotourism programs that focus on ecotourism experiences that increase ecotourism behavioral intentions by increasing levels of perceived ecotourism usefulness, biospheric value, ecotourism self-identity, environmental attitude, subjective norms, and perceived behavioral control, thereby enhancing ecotourism behavior at nature-based tourism destinations and assisting in the development of sustainable tourism.


Data ◽  
2020 ◽  
Vol 5 (4) ◽  
pp. 108
Author(s):  
Shamil Magomedov ◽  
Dmirty Ilin ◽  
Anastasiya Silaeva ◽  
Evgeny Nikulchev

This paper presents the dataset and the results of the analysis of user reactions when filling out questionnaires. Based on the analysis of 1980 results of users’ responses to simple questionnaire questions, patterns in user reactions were revealed. Data analysis shows that a user is characterized by reactions when answering a variety of questions, reflecting the individual skills of the interface, reading speed, speed of choosing an answer, which can be used to supplement personal verification in information systems. The built-in reaction time does not significantly load the data volumes for logging and transferring and does not contain confidential information. The data would be of interest for further research by specialists in the field of psychology, information security, and information systems design.


Sign in / Sign up

Export Citation Format

Share Document