IS professionals' information security behaviors in Chinese IT organizations for information security protection

被引:17
|
作者
Ma, Xiaofen [1 ]
机构
[1] Natl Univ Singapore, Fac Arts & Social Sci, Commun & New Media, Singapore 117416, Singapore
关键词
IS professionals; Information security protective behaviors; Theory of planned behavior; Protection motivation theory; Organizational commitment; MOTIVATION THEORY; FEAR APPEALS; POLICY COMPLIANCE; CITIZENSHIP BEHAVIOR; PLANNED BEHAVIOR; USER SECURITY; SELF-EFFICACY; MODEL; COMMITMENT; EXTENSION;
D O I
10.1016/j.ipm.2021.102744
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Continued integration of technology for the purpose of connecting and exchanging data with other devices and systems over the Internet exposes information security (IS) to growing risks. Organizations can thus achieve a strategic advantage by securing IS as a pivotal information and intelligence asset. This study examined ways of motivating IS professionals to protect information security from potential risks, drawing on the theoretical frameworks of protection motivation theory (PMT) and the theory of planned behavior (TPB) as well as work-related organizational antecedents (e.g., organizational commitment and job satisfaction). This paper proposes structural equation modeling (SEM) in R as a framework for exploring relationships among the variables and determining the overall data fit to the hypotheses. SEM is a multivariate technique which simultaneously executes both factor analysis and aspects of multiple regression in order to estimate interrelated relationships while also allowing path analytic modeling to be performed with latent, unobserved variables. Using 804 questionnaires with SEM analysis, we find support for the following predictors' associations: (a) information security attitudes and subjective norms, as constituents of TPB, significantly influenced information security protective behaviors; (b) the coping appraisals (self-efficacy and response cost) and threat appraisals (threat susceptibility and threat severity) of PMT were significantly predictive of information security protective behaviors; and (c) organizational commitment positively impacted information security protective behaviors. However, job satisfaction and perceived behavioral control as a construct of TPB were not associated with information security behaviors. The main theoretical contribution of this research is that the addition of organizational commitment allows the behavioral science model to offer a novel understanding of IS professionals' protection motivation and actual behaviors in the Chinese context. This study has several practical implications for organizations. In order to encourage IS professionals to follow protective security behaviors, organizations should set up the belief that a close relationship with subordinates plays a vital role in ensuring information security, improve IS employees' perception and cognition of their importance to the organization, constantly highlight the importance of information security protection, and emphasize the severe consequences of information security threats during trainings.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] INFORMATION SECURITY IN ORGANIZATIONS
    Cirnu, Doris
    Banta, Victor
    [J]. METALURGIA INTERNATIONAL, 2013, 18 (03): : 227 - 231
  • [2] Access to user data stored by organizations-divides surrounding information security professionals in Chinese IT organizations
    Ma, Xiaofen
    Cho, Hichang
    [J]. CHINESE JOURNAL OF COMMUNICATION, 2022, 15 (01) : 1 - 33
  • [3] Information Security and Data Protection: The Role of the "Human Factor" in Organizations
    Hugl, Ulrike
    [J]. PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 80 - 87
  • [4] The valued coexistence of protection motivation and stewardship in information security behaviors
    Ogbanufe, Obi
    Crossler, Robert E.
    Biros, David
    [J]. COMPUTERS & SECURITY, 2023, 124
  • [5] Information security and data protection
    Qureshi, AA
    Siegel, JG
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2001, 14 (1-3) : 1 - 16
  • [6] Challenges in Information Security Protection
    Pereira, Teresa
    Santos, Henrique
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 160 - 166
  • [7] The effective implementation of information security in organizations
    Hoppe, OA
    van Niekerk, J
    von Solms, R
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 1 - 18
  • [8] ASPECTS OF INFORMATION SECURITY IN THE MANAGEMENT OF ORGANIZATIONS
    Telespan, Constantin
    [J]. GLOBALIZATION AND INTERCULTURAL DIALOGUE: MULTIDISCIPLINARY PERSPECTIVES - ECONOMY AND MANAGEMENT, 2014, : 784 - 789
  • [9] Strategic approach to information security in organizations
    Park, Sangseo
    Ruighaver, Tobias
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 26 - +
  • [10] From Information Security to Cyber Security Cultures Organizations to Societies
    Reid, Rayne
    Van Niekerk, Lohan
    [J]. 2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,