Influence of Information Overload on IT Security Behavior: A Theoretical Framework

被引:0
|
作者
Bandyopadhyay, Tridib [1 ]
Zafar, Humayun [1 ]
机构
[1] Kennesaw State Univ, Kennesaw, GA 30144 USA
来源
关键词
Security; information overload; systems; SYSTEMS SECURITY; COMPUTER ABUSE; ETHICS; MODEL; TECHNOLOGY; INSIDER; ORGANIZATIONS; TECHNOSTRESS; VALUES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IT systems in organizational processes demand high level of security. The operational security of IT systems depends on end-user IT security behavior. The apparent importance of IT security requires that the end-users process and act on a multitude of IT security information and updates. Information overload (also known as infobesity, data smog etc.), in its manifest combinatorial forms of sensory, cognitive and communication overloads, impact the quality, speed and efficacy of decisions (Rogers, Puryear and Root, 2013). This research attempts to analyze similar impact of plausible IT security information overload on the IT security behavior of organizational end-users. A hierarchical model of the impact of information overload on organizational end-users' IT security behavior is proposed here. This research extends the literature of information overload in the area of information security and creates a framework for empirical validation of the theoretical underpinnings in the emerging area.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] The Cultural Foundation of Information Security Behavior: Developing a Cultural Fit Framework for Information Security Behavior Control
    Lin, Canchu
    Kunnathur, Anand S.
    Li, Long
    JOURNAL OF DATABASE MANAGEMENT, 2020, 31 (02) : 21 - 41
  • [2] DISTRIBUTED COGNITION AS A THEORETICAL FRAMEWORK FOR INFORMATION BEHAVIOR STUDIES
    Pereira Rocha, Janicy Aparecida
    Anastacio de Paula, Claudio Paixao
    Sirihal Duarte, Adriana Bogliolo
    INFORMACAO & SOCIEDADE-ESTUDOS, 2016, 26 (02) : 91 - 105
  • [3] Self-efficacy in information security: its influence on end users' information security practice behavior
    Rhee, Hyeun-Suk
    Kim, Cheongtag
    Ryu, Young U.
    COMPUTERS & SECURITY, 2009, 28 (08) : 816 - 826
  • [4] A Theoretical Conversation about Responses to Information Overload
    Lehman, Amanda
    Miller, Sophie Jo
    INFORMATION, 2020, 11 (08)
  • [5] Theoretical aspects of information security
    Vydrin A.S.
    Journal of Mathematical Sciences, 2009, 156 (2) : 261 - 275
  • [6] The behavior of overload information radiosystems prognosis
    Bychkovsky, V. A.
    VISNYK NTUU KPI SERIIA-RADIOTEKHNIKA RADIOAPARATOBUDUVANNIA, 2008, (36): : 21 - 24
  • [7] Genre containers: Building a theoretical framework for studying formats in information behavior
    Brannon, Brittany
    Buhler, Amy G.
    Cataldo, Tara Tobin
    Faniel, Ixchel M.
    Connaway, Lynn Silipigni
    Valenza, Joyce Kasman
    Cyr, Christopher
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 2022, 73 (04) : 609 - 624
  • [8] A FRAMEWORK FOR INFORMATION SECURITY MANAGEMENT
    Angheluta, Dragos-Ionut
    Lupu, Luminita-Mihaela
    FROM MANAGEMENT OF CRISIS TO MANAGEMENT IN A TIME OF CRISIS, 2016, : 2 - 16
  • [9] Alcatel information security framework
    Hayes, J
    ALCATEL TELECOMMUNICATIONS REVIEW, 2002, (04): : 273 - 279
  • [10] Security Framework for Information Systems
    Martins, Jose
    dos Santos, Henrique
    Nunes, Paulo
    PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 164 - 176