The Assumptions and Profiles Behind IT Security Behavior

dc.contributor.author Balozian, Puzant
dc.contributor.author Leidner, Dorothy
dc.date.accessioned 2016-12-29T01:52:12Z
dc.date.available 2016-12-29T01:52:12Z
dc.date.issued 2017-01-04
dc.description.abstract Among the major IT security challenges facing organizations is non-malicious employee behavior that nevertheless poses significant threats to an organization’s IT security. Using a grounded theory methodology, this paper finds that organizational security behaviors are inherently related to employee assumptions regarding the importance of IT security policy compliance and regarding the reason why IT security measures are implemented. Analyzing these assumptions uncovers four profiles of perspectives concerning IT security: the IT Security Indulgence, the IT Security Overindulgence, the IT Knows Best and the IT Security Disconnect profiles. These profiles are useful in understanding employee IT security behaviors and may help IT departments in developing more effective strategies designed to ensure policy compliance.
dc.format.extent 10 pages
dc.identifier.doi 10.24251/HICSS.2017.605
dc.identifier.isbn 978-0-9981331-0-2
dc.identifier.uri http://hdl.handle.net/10125/41767
dc.language.iso eng
dc.relation.ispartof Proceedings of the 50th Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject Security Profiles
dc.subject IT Security
dc.subject Security Assumptions
dc.subject IT policy compliance
dc.subject Grounded Theory
dc.title The Assumptions and Profiles Behind IT Security Behavior
dc.type Conference Paper
dc.type.dcmi Text
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
paper0618.pdf
Size:
1.17 MB
Format:
Adobe Portable Document Format
Description: