Please use this identifier to cite or link to this item:

The Assumptions and Profiles Behind IT Security Behavior

File SizeFormat 
paper0618.pdf1.2 MBAdobe PDFView/Open

Item Summary

Title: The Assumptions and Profiles Behind IT Security Behavior
Authors: Balozian, Puzant
Leidner, Dorothy
Keywords: Security Profiles
IT Security
Security Assumptions
IT policy compliance
Grounded Theory
Issue Date: 04 Jan 2017
Abstract: Among the major IT security challenges facing organizations is non-malicious employee behavior that nevertheless poses significant threats to an organization’s IT security. Using a grounded theory methodology, this paper finds that organizational security behaviors are inherently related to employee assumptions regarding the importance of IT security policy compliance and regarding the reason why IT security measures are implemented. Analyzing these assumptions uncovers four profiles of perspectives concerning IT security: the IT Security Indulgence, the IT Security Overindulgence, the IT Knows Best and the IT Security Disconnect profiles. These profiles are useful in understanding employee IT security behaviors and may help IT departments in developing more effective strategies designed to ensure policy compliance.
Pages/Duration: 10 pages
ISBN: 978-0-9981331-0-2
DOI: 10.24251/HICSS.2017.605
Rights: Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections:Information Security, Privacy, and Policy Minitrack

Please contact if you need this content in an ADA compliant alternative format.

Items in ScholarSpace are protected by copyright, with all rights reserved, unless otherwise indicated.