Redirigiendo al acceso original de articulo en 20 segundos...
ARTÍCULO
TITULO

Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis

Duy Dang-Pham    
Karlheinz Kautz    
Siddhi Pittayachawan    
Vince Bruno    

Resumen

Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees? perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior studies have identified the antecedents of a positive InfoSec climate, in particular socialisation through the employees? discussions of InfoSec-related matters to explain the formation of InfoSec climate based on the employees? individual cognition. We conceptualise six forms of socialisation as six networks, which comprise employees? provisions of (1) work advice, (2) organisational updates, (3) personal advice, (4) trust for expertise, (5) InfoSec advice, and (6) InfoSec troubleshooting support. The adoption of a longitudinal social network analysis (SNA), called stochastic actor-oriented modelling (SAOM), enabled us to analyse the changes in the socialising patterns and the InfoSec climate perceptions over time. Consequently, this analysis explains the forming mechanisms of the employees? InfoSec climate perceptions as well as their socialising process in greater detail. Our findings in relation to the forming mechanisms of InfoSec-related socialisation and InfoSec climate, provide practical recommendations to improve organisational InfoSec. This includes identifying influential employees to diffuse InfoSec knowledge within a workplace. Additionally, this research proposes a novel approach for InfoSec behavioural research through the adoption of SNA methods to study InfoSec-related phenomena.

 Artículos similares

       
 
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences

 
Hamad Almaghrabi, Ben Soh and Alice Li    
Effective and efficient use of information and communication technology (ICT) systems in the administration of educational organisations is crucial to optimise their performance. Earlier research on the identification and analysis of ICT users? satisfact... ver más
Revista: Information

 
Ping Huang and Yafeng Wu    
Airborne speech enhancement is always a major challenge for the security of airborne systems. Recently, multi-objective learning technology has become one of the mainstream methods of monaural speech enhancement. In this paper, we propose a novel multi-o... ver más
Revista: Aerospace

 
Yi Zhao and Song-Kyoo Kim    
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ... ver más
Revista: Information

 
Sakorn Mekruksavanich and Anuchit Jitpattanakul    
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ... ver más
Revista: Information