The Assumptions and Profiles Behind IT Security Behavior

dc.contributor.authorBalozian, Puzant
dc.contributor.authorLeidner, Dorothy
dc.date.accessioned2016-12-29T01:52:12Z
dc.date.available2016-12-29T01:52:12Z
dc.date.issued2017-01-04
dc.description.abstractAmong the major IT security challenges facing organizations is non-malicious employee behavior that nevertheless poses significant threats to an organization’s IT security. Using a grounded theory methodology, this paper finds that organizational security behaviors are inherently related to employee assumptions regarding the importance of IT security policy compliance and regarding the reason why IT security measures are implemented. Analyzing these assumptions uncovers four profiles of perspectives concerning IT security: the IT Security Indulgence, the IT Security Overindulgence, the IT Knows Best and the IT Security Disconnect profiles. These profiles are useful in understanding employee IT security behaviors and may help IT departments in developing more effective strategies designed to ensure policy compliance.
dc.format.extent10 pages
dc.identifier.doi10.24251/HICSS.2017.605
dc.identifier.isbn978-0-9981331-0-2
dc.identifier.urihttp://hdl.handle.net/10125/41767
dc.language.isoeng
dc.relation.ispartofProceedings of the 50th Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectSecurity Profiles
dc.subjectIT Security
dc.subjectSecurity Assumptions
dc.subjectIT policy compliance
dc.subjectGrounded Theory
dc.titleThe Assumptions and Profiles Behind IT Security Behavior
dc.typeConference Paper
dc.type.dcmiText

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
paper0618.pdf
Size:
1.17 MB
Format:
Adobe Portable Document Format