Development and validation of instruments of information security deviant behavior

被引:30
|
作者
Chu, Amanda M. Y. [1 ]
Chau, Patrick Y. K. [2 ]
机构
[1] City Univ Hong Kong, Dept Management Sci, Hong Kong, Hong Kong, Peoples R China
[2] Univ Hong Kong, Fac Business & Econ, Hong Kong, Hong Kong, Peoples R China
关键词
Information security; Deviant behavior; Instrument development; Measurement; Validity; Reliability; EXTRA-ROLE BEHAVIORS; SYSTEMS SECURITY; SOFTWARE PIRACY; COMPUTER CRIME; FIT INDEXES; WORKPLACE; KNOWLEDGE; CONSTRUCT; MODEL; AGGRESSION;
D O I
10.1016/j.dss.2014.06.008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security deviant behavior (ISDB) of employees is a serious threat to organizations. However, not much empirical research on ISDB has been carried out. This paper attempts to develop and validate instruments of ISDB using an empirical method. Two instruments of ISDB are proposed and tested, including a four-item instrument of resource misuse (ISDB that is related to the misuse of information systems resources) and a three-item instrument of security carelessness (ISDB that is related to the employees' omissive activities when using computers or handling data). A rigorous instrument development process which includes three surveys and addresses six crucial measurement properties (content analysis, factorial validity, reliability, convergent validity, discriminant validity, and nomological validity) is adopted. The implications of these two instruments for future empirical studies on ISDB are discussed. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:93 / 101
页数:9
相关论文
共 50 条
  • [31] Empirical validation of the applicability of an integrative theory of deviant behavior to the study of drug use
    Kaplan, HB
    JOURNAL OF DRUG ISSUES, 1996, 26 (02) : 345 - 377
  • [32] Taxonomy of compliant information security behavior
    Padayachee, Keshnee
    COMPUTERS & SECURITY, 2012, 31 (05) : 673 - 680
  • [33] Information Security Behavior: Recognizing the Influencers
    Alohali, Manal
    Clarke, Nathan
    Furnell, Steven
    Albakri, Saad
    2017 COMPUTING CONFERENCE, 2017, : 844 - 853
  • [34] Work ethic and information security behavior
    Ramakrishnan, Thiagarajan
    Hite, Dwight M.
    Schuessler, Joseph H.
    Prybutok, Victor
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 364 - 381
  • [35] Development and Validation of a Set of Instruments to Measure Food Environments
    Araneda-Flores, Jacqueline
    Oliva Moresco, Patricio
    Quezada-Figueroa, Gladys
    Lobos-Fernandez, Luz
    Leyton, Barbara
    Christina Pinheiro, Anna
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2022, 19 (21)
  • [36] Detecting deviant behavior
    不详
    BIOTECHNIQUES, 2006, 40 (06) : 703 - 703
  • [37] Security Awareness: The First Step in Information Security Compliance Behavior
    Hwang, Inho
    Wakefield, Robin
    Kim, Sanghyun
    Kim, Taeha
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2021, 61 (04) : 345 - 356
  • [38] Deviant Behavior Foreword
    Ashar, Bimal H.
    MEDICAL CLINICS OF NORTH AMERICA, 2019, 103 (05) : XV - XVI
  • [39] Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective
    Chu, Amanda M. Y.
    So, Mike K. P.
    SUSTAINABILITY, 2020, 12 (08)
  • [40] DEVIANT SOCIOSEXUAL BEHAVIOR
    KNOL, BW
    SCHAEFERSOKKENS, AC
    TIJDSCHRIFT VOOR DIERGENEESKUNDE, 1994, 119 (17) : 510 - 510