scholarly journals Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France

2020 ◽  
Vol 28 (2) ◽  
pp. 1-28 ◽  
Author(s):  
Paméla Baillette ◽  
Yves Barlette

Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context. This article investigates employee coping strategies related to BYOD ISS threats in France. The results of a survey of 223 employees indicate that while perceived behavioral control exerts only direct effects on problem-focused (i.e., disturbance handling) and emotion-focused (i.e., self-preservation) coping strategies, ISS concern exhibits significant direct and moderating influences. Several security paradoxes could be identified, namely, discrepancies between the respondents' ISS concern and the adopted coping strategies. This article offers the first insights into the French context and can serve as a basis for comparisons in future research and to help improve employees' personal ISS in the professional context.

Author(s):  
Paméla Baillette ◽  
Yves Barlette

Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context. This article investigates employee coping strategies related to BYOD ISS threats in France. The results of a survey of 223 employees indicate that while perceived behavioral control exerts only direct effects on problem-focused (i.e., disturbance handling) and emotion-focused (i.e., self-preservation) coping strategies, ISS concern exhibits significant direct and moderating influences. Several security paradoxes could be identified, namely, discrepancies between the respondents' ISS concern and the adopted coping strategies. This article offers the first insights into the French context and can serve as a basis for comparisons in future research and to help improve employees' personal ISS in the professional context.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Piotr Przymuszała ◽  
Magdalena Cerbin-Koczorowska ◽  
Patrycja Marciniak-Stępak ◽  
Łucja Zielińska-Tomczak ◽  
Martyna Piszczek ◽  
...  

Abstract Background The Communication Skills Attitude Scale (CSAS) is a recognized tool for assessment of attitudes towards communication learning. In the original version, it consists of 26 items divided on theoretical assumptions into two subscales: Positive and Negative Attitudes Scales. However, the evidence for its structure seems unsatisfactory, and a simple division into positive and negative attitudes may be insufficient to describe attitudes of medical students towards communication learning. Moreover, the existing evidence of the test-retest reliability of the CSAS seems limited. Consequently, this study aimed to provide more evidence on its psychometric properties while validating the CSAS questionnaire in a cohort of Polish medical students. Methods The CSAS was translated, adapted into Polish, and validated in a cohort of 389 Polish medical students. Statistical analysis involved, among others, parallel analysis to determine the number of factors, confirmatory factor analysis to compare the proposed model with theory-based ones, and test-retest reliability analysis. Results Conducted analysis revealed that in the examined population, the CSAS should rather consist of four than two subscales. Proposed four subscales addressed perceived outcomes of communication learning, positive and negative attitudes towards it (affective components), and factors motivating students to learn communication (a cognitive component of attitudes). Results of test-retest reliability were satisfactory for individual items and subscales. Conclusions This study presented a valid and reliable version of the Communication Skills Attitude Scale for Polish medical students and confirmed previous assumptions that CSAS may also be appropriate for assessment of affective and cognitive components of attitudes. Future research should, based on Ajzen’s Theory of Planned Behavior, make attempts to develop a tool assessing not only attitudes but also subjective norms and perceived behavioral control.


2021 ◽  
Vol 12 (1) ◽  
pp. 49-59
Author(s):  
Asep Sumaryo ◽  
Purnama Putra

Indonesia is a country with the largest Muslim population in the world of its 240 million people,88.2% are Muslims. Islamic banks exist because of the public's need for alternative transactions thatare interest-free. However, the growth of Islamic banks in Indonesia is still not optimal, one of thefactors is that people are still not enthusiastic about Islamic banks and the lack of intention of thepeople to become customers of Islamic banks. There are several factors that affect the intention interms of planned behavior theory, namely attitudes, subjective norms and perceptions of behaviorcontrol. So the research aims to determine the effect of attitudes, subjective norms and perceptionsof behavioral control on the intention of the people of Bekasi city to become customers in Islamicbanks. The research method uses multiple linear regression analysis. The data used are the results ofquestionnaires distributed to 12 districts in the city of Bekasi. The sample consisted of 132 people inBekasi city who were taken by using purposive sampling technique. Data were tested partially andsimultaneously. The data is processed using SPSS (Statistical Product and Service Solution) version22. The results of this study show partially that attitude variables have a positive and significant effect,subjective norm variables have a positive and significant effect, behavioral control perceptions have apositive but insignificant effect on intention to become a customer. Islamic Bank. Meanwhile, attitudes,subjective norms and perceived behavioral control simultaneously have a significant positive effect onthe intention to become a customer of Islamic banks. Future research is expected to expand the scopeof research, add variables and other factors and extend the research period.


2013 ◽  
Vol 25 (3) ◽  
pp. 32-51 ◽  
Author(s):  
Salvatore Aurigemma

To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned behavior, a composite model is presented that incorporates the strengths of previous studies while minimizing theoretical gaps present in other behavioral compliance models. In building the framework, related operational constructs are examined and normalized to allow better comparison of past studies and help focus future research efforts.


2015 ◽  
Vol 28 (1) ◽  
pp. 57-74 ◽  
Author(s):  
Melinda L. Korzaan ◽  
Nita G. Brooks

Proper management of information technology (IT) projects remains important within organizations; they require tremendous investment and consume valuable resources. To enhance one's understanding of IT projects and the continued issue of project failure, this study develops a model of the psychological influences of IT project commitment for individuals working on IT projects and its influence on intentions to continue an IT project (ICITP). Survey responses from 232 individuals across several organizations were obtained, and structural equation modeling was used to analyze the data. Three forms of project commitment (affective, continuance, and normative), subjective norm, and perceived behavioral control – internal were significant predictors of ICITP, explaining 64% of the variance. Additionally, continuance commitment and perceived behavioral control – internal were found to explain 46% of the variance in affective commitment. Implications and directions for future research are provided.


2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.


2019 ◽  
Vol 1 (2) ◽  
pp. 1-11
Author(s):  
Nooredin Etezady

Understanding employee's security behavior is required before effective security policies and training materials can be developed. The Anti-virus software, secure systems design methods, information management standards, and information systems security policies; which have been developed and implemented by many organizations; have not been successfully adopted. Information systems research is encompassing social aspects of systems research more and more in order to explain user behavior and improve technology acceptance. Theory of planned behavior (TPB) based on attitude, subjective norm, and perceived behavioral control constructs, considers intentions as cognitive antecedents of actions or behavior. This study reviews various research on attitude and finds the most common measures for attitude, which can be used in organizations to develop a method to influence employees' attitude positively with the goal of inducing positive security behavior. Further, a conceptual model for operationalizing the obtained measures for enhancing information security in organizations is presented.


2020 ◽  
Vol 32 (7) ◽  
pp. 1451-1473
Author(s):  
Siew Imm Ng ◽  
Fang Zhao ◽  
Xin-Jean Lim ◽  
Norazlyn Kamal Basha ◽  
Murali Sambasivan

Purpose The well-being of the elderly is a growing issue of concern for countries around the world. One way to enhance the elderly well-being is to provide housing options suitable to their needs and lifestyle. Retirement village is an accommodation concept foreign to the Malaysian population. Therefore, the purpose of this paper is to bridge this literature gap by analyzing factors that may inhibit or motivate the buying intention of a retirement village unit among the elderly in Malaysia. Design/methodology/approach Data were collected from 261 Malaysian elderly and analyzed using structural equation modeling PLS. Findings The results indicated that attitude, subjective norm, perceived behavioral control and social sustainability were significant predictors that explained elderly buying intention of retirement village. Originality/value The study also found a significant moderating role of religion in attitude–intention relationship. The paper concludes with the study’s implications, limitations and recommendations for future research.


2015 ◽  
Vol 23 (4) ◽  
pp. 370-381 ◽  
Author(s):  
André Lötter ◽  
Lynn Futcher

Purpose – The purpose of this paper is to propose a framework to address the problem that email users are not well-informed or assisted by their email clients in identifying possible phishing attacks, thereby putting their personal information at risk. This paper therefore addresses the human weakness (i.e. the user’s lack of knowledge of phishing attacks which causes them to fall victim to such attacks) as well as the software related issue of email clients not visually assisting and guiding the users through the user interface. Design/methodology/approach – A literature study was conducted in the main field of information security with a specific focus on understanding phishing attacks and a modelling technique was used to represent the proposed framework. This paper argues that the framework can be suitably implemented for email clients to raise awareness about phishing attacks. To validate the framework as a plausible mechanism, it was reviewed by a focus group within the School of Information and Communication Technology (ICT) at the Nelson Mandela Metropolitan University (NMMU). The focus group consisted of academics and research students in the field of information security. Findings – This paper argues that email clients should make use of feedback mechanisms to present security related aspects to their users, so as to make them aware of the characteristics pertaining to phishing attacks. To support this argument, it presents a framework to assist email users in the identification of phishing attacks. Research limitations/implications – Future research would yield interesting results if the proposed framework were implemented into an existing email client to determine the effect of the framework on the user’s level of awareness of phishing attacks. Furthermore, the list of characteristics could be expanded to include all phishing types (such as clone phishing, smishing, vishing and pharming). This would make the framework more dynamic in that it could then address all forms of phishing attacks. Practical implications – The proposed framework could enable email clients to provide assistance through the user interface. Visibly relaying the security level to the users of the email client, and providing short descriptions as to why a certain email is considered suspicious, could result in raising the awareness of the average email user with regard to phishing attacks. Originality/value – This research presents a framework that email clients can use to identify common forms of normal and spear phishing attacks. The proposed framework addresses the problem that the average Internet user lacks a baseline level of online security awareness. It argues that the email client is the ideal place to raise the awareness of users regarding phishing attacks.


2014 ◽  
Vol 27 (4) ◽  
pp. 307-327 ◽  
Author(s):  
Christian Koropp ◽  
Franz W. Kellermanns ◽  
Dietmar Grichnik ◽  
Laura Stanley

Adapting the theory of planned behavior to the area of financial choices in family firms, we argue that these choices in family firms are largely affected by family norms, attitude, perceived behavioral control, and behavioral intentions. A time-lagged sample, estimated via structural equation modeling of 118 German family firms, supports a behavioral approach to the study of financing decisions. Specifically, we show that family norms and attitude toward external debt and external equity affect behavioral intention to use the respective financing choices, which in turn affects financing behavior. Perceived behavioral control, however, was shown to negatively affect behavioral intentions to use external equity and was positively related to the use of internal funds. Implications of these capital structure decisions and ideas for future research are discussed.


Sign in / Sign up

Export Citation Format

Share Document