ARTÍCULO
TITULO

Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis

Duy Dang-Pham    
Karlheinz Kautz    
Siddhi Pittayachawan    
Vince Bruno    

Resumen

Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees? perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior studies have identified the antecedents of a positive InfoSec climate, in particular socialisation through the employees? discussions of InfoSec-related matters to explain the formation of InfoSec climate based on the employees? individual cognition. We conceptualise six forms of socialisation as six networks, which comprise employees? provisions of (1) work advice, (2) organisational updates, (3) personal advice, (4) trust for expertise, (5) InfoSec advice, and (6) InfoSec troubleshooting support. The adoption of a longitudinal social network analysis (SNA), called stochastic actor-oriented modelling (SAOM), enabled us to analyse the changes in the socialising patterns and the InfoSec climate perceptions over time. Consequently, this analysis explains the forming mechanisms of the employees? InfoSec climate perceptions as well as their socialising process in greater detail. Our findings in relation to the forming mechanisms of InfoSec-related socialisation and InfoSec climate, provide practical recommendations to improve organisational InfoSec. This includes identifying influential employees to diffuse InfoSec knowledge within a workplace. Additionally, this research proposes a novel approach for InfoSec behavioural research through the adoption of SNA methods to study InfoSec-related phenomena.

 Artículos similares

       
 
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences

 
Hamad Almaghrabi, Ben Soh and Alice Li    
Effective and efficient use of information and communication technology (ICT) systems in the administration of educational organisations is crucial to optimise their performance. Earlier research on the identification and analysis of ICT users? satisfact... ver más
Revista: Information

 
Sakorn Mekruksavanich and Anuchit Jitpattanakul    
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ... ver más
Revista: Information

 
Nicollas Rodrigues de Oliveira, Yago de Rezende dos Santos, Ana Carolina Rocha Mendes, Guilherme Nunes Nasseh Barbosa, Marcela Tuler de Oliveira, Rafael Valle, Dianne Scherly Varela Medeiros and Diogo M. F. Mattos    
The COVID-19 pandemic has highlighted the necessity for agile health services that enable reliable and secure information exchange, but achieving proper, private, and secure sharing of EMRs remains a challenge due to diverse data formats and fragmented r... ver más
Revista: Information

 
Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou and Mehrdad Dianati    
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Although se... ver más
Revista: Information