Development and validation of instruments of information security deviant behavior

被引:30
|
作者
Chu, Amanda M. Y. [1 ]
Chau, Patrick Y. K. [2 ]
机构
[1] City Univ Hong Kong, Dept Management Sci, Hong Kong, Hong Kong, Peoples R China
[2] Univ Hong Kong, Fac Business & Econ, Hong Kong, Hong Kong, Peoples R China
关键词
Information security; Deviant behavior; Instrument development; Measurement; Validity; Reliability; EXTRA-ROLE BEHAVIORS; SYSTEMS SECURITY; SOFTWARE PIRACY; COMPUTER CRIME; FIT INDEXES; WORKPLACE; KNOWLEDGE; CONSTRUCT; MODEL; AGGRESSION;
D O I
10.1016/j.dss.2014.06.008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security deviant behavior (ISDB) of employees is a serious threat to organizations. However, not much empirical research on ISDB has been carried out. This paper attempts to develop and validate instruments of ISDB using an empirical method. Two instruments of ISDB are proposed and tested, including a four-item instrument of resource misuse (ISDB that is related to the misuse of information systems resources) and a three-item instrument of security carelessness (ISDB that is related to the employees' omissive activities when using computers or handling data). A rigorous instrument development process which includes three surveys and addresses six crucial measurement properties (content analysis, factorial validity, reliability, convergent validity, discriminant validity, and nomological validity) is adopted. The implications of these two instruments for future empirical studies on ISDB are discussed. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:93 / 101
页数:9
相关论文
共 50 条
  • [1] Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review
    Anti, Emmanuel
    Vartiainen, Tero
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2024, 55 : 1 - 36
  • [2] The role of collectivism, power distance, and neutralization techniques on deviant information security behavior
    Mohammed, Yimer
    Warkentin, Merrill
    Paul, Chinju
    Beshah, Tibebe
    TECHNOLOGY IN SOCIETY, 2025, 81
  • [3] Deviant behavior variety scale: development and validation with a sample of Portuguese adolescents
    Sanches, Cristina
    Gouveia-Pereira, Maria
    Maroco, Joao
    Gomes, Hugo
    Roncon, Filipa
    PSICOLOGIA-REFLEXAO E CRITICA, 2016, 29
  • [4] Deviant behavior variety scale: development and validation with a sample of Portuguese adolescents
    Cristina Sanches
    Maria Gouveia-Pereira
    João Marôco
    Hugo Gomes
    Filipa Roncon
    Psicologia: Reflexão e Crítica, 29
  • [5] Development and Validation of the Nursing Information Security Questionnaire
    Zhou, Xiaoyun
    Jing, Xiujuan
    Gao, Tingting
    Liu, Hong
    Jing, Xuebing
    APPLIED CLINICAL INFORMATICS, 2025, 16 (01): : 44 - 55
  • [6] Developing a Typological Theory Using a Quantitative Approach: A Case of Information Security Deviant Behavior
    Chu, Amanda M. Y.
    Chau, Patrick Y. K.
    So, Mike K. P.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2015, 37 : 510 - 535
  • [7] A deviant family as a factor in development of deviant behavior in children
    Bakhadova, E. V.
    VOPROSY PSIKHOLOGII, 2009, (01) : 37 - +
  • [8] Deviant Behavior in Computer-Mediated Communication: Development and Validation of a Measure of Cybersexual Harassment
    Ritter, Barbara A.
    JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2014, 19 (02): : 197 - 214
  • [9] Toward a stage theory of the development of employees' information security behavior
    Karjalainen, Mari
    Siponen, Mikko
    Sarker, Suprateek
    COMPUTERS & SECURITY, 2020, 93
  • [10] POLYGRAPH AND INTERVIEW VALIDATION OF SELF-REPORTED DEVIANT BEHAVIOR
    CLARK, JP
    TIFFT, LL
    AMERICAN SOCIOLOGICAL REVIEW, 1966, 31 (04) : 516 - 525