Development and validation of instruments of information security deviant behavior

被引:30
|
作者
Chu, Amanda M. Y. [1 ]
Chau, Patrick Y. K. [2 ]
机构
[1] City Univ Hong Kong, Dept Management Sci, Hong Kong, Hong Kong, Peoples R China
[2] Univ Hong Kong, Fac Business & Econ, Hong Kong, Hong Kong, Peoples R China
关键词
Information security; Deviant behavior; Instrument development; Measurement; Validity; Reliability; EXTRA-ROLE BEHAVIORS; SYSTEMS SECURITY; SOFTWARE PIRACY; COMPUTER CRIME; FIT INDEXES; WORKPLACE; KNOWLEDGE; CONSTRUCT; MODEL; AGGRESSION;
D O I
10.1016/j.dss.2014.06.008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security deviant behavior (ISDB) of employees is a serious threat to organizations. However, not much empirical research on ISDB has been carried out. This paper attempts to develop and validate instruments of ISDB using an empirical method. Two instruments of ISDB are proposed and tested, including a four-item instrument of resource misuse (ISDB that is related to the misuse of information systems resources) and a three-item instrument of security carelessness (ISDB that is related to the employees' omissive activities when using computers or handling data). A rigorous instrument development process which includes three surveys and addresses six crucial measurement properties (content analysis, factorial validity, reliability, convergent validity, discriminant validity, and nomological validity) is adopted. The implications of these two instruments for future empirical studies on ISDB are discussed. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:93 / 101
页数:9
相关论文
共 50 条
  • [41] ROLE OF AUDIENCE IN DEVIANT-BEHAVIOR AND DEVIANT IDENTITY
    HEPBURN, JR
    SOCIOLOGY AND SOCIAL RESEARCH, 1975, 59 (04): : 387 - 405
  • [42] EFFECT OF DEVELOPMENTALLY RELEVANT INFORMATION AND SEVERITY OF DISTURBANCE ON UNDERSTANDING AND EVALUATION DEVIANT BEHAVIOR
    GOLDFRIE.MR
    ADINOLFI, AA
    DWORKIN, E
    JOURNAL OF ABNORMAL PSYCHOLOGY, 1969, 74 (04) : 482 - &
  • [43] Evaluating Online Security Behavior: Development and Validation of a Personal Cybersecurity Awareness Scale for University Students
    Laszlo, Bognar
    Laszlo, Bottyan
    EDUCATION SCIENCES, 2024, 14 (06):
  • [44] Verification, Validation, and Evaluation in Information Security Risk Management
    Fenz, Stefan
    Ekelhart, Andreas
    IEEE SECURITY & PRIVACY, 2011, 9 (02) : 58 - 65
  • [45] IS CRIMINAL BEHAVIOR DEVIANT-BEHAVIOR
    QUINNEY, R
    BRITISH JOURNAL OF CRIMINOLOGY, 1965, 5 (02): : 132 - 142
  • [46] Personal Information Culture: Security and Development
    Gutova, Svetlana G.
    Samokhina, Natalya N.
    Tselishcheva, Zukhra A.
    Litsuk, Andrei A.
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 6651 - 6658
  • [47] Information security management metrics development
    Herrera, SOS
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 51 - 56
  • [48] Developmental paradigm for criminology: development and self-regulation of deviant behavior
    Le Blanc, Marc
    CRIMINOLOGIE, 2010, 43 (02) : 401 - 428
  • [49] The Development and Validation of the Leader as Security Provider Scale
    Molero, Fernando
    Mikulincer, Mario
    Shaver, Phillip R.
    Laguia, Ana
    Moriano, Juan. A.
    JOURNAL OF WORK AND ORGANIZATIONAL PSYCHOLOGY-REVISTA DE PSICOLOGIA DEL TRABAJO Y DE LAS ORGANIZACIONES, 2019, 35 (03): : 183 - 193
  • [50] Analysis of personal information security behavior and awareness
    Ogutcu, Gizem
    Tastik, Ozlem Muge
    Chouseinoglou, Oumout
    COMPUTERS & SECURITY, 2016, 56 : 83 - 93