Eylem Seç
Moderating Neutralization Techniques in Information Security Violations through Expertise: A Correlational Study
Başlık:
Moderating Neutralization Techniques in Information Security Violations through Expertise: A Correlational Study
Yazar:
Miller, Bruce, author.
ISBN:
9780438124097
Yazar Ek Girişi:
Fiziksel Tanımlama:
1 electronic resource (123 pages)
Genel Not:
Source: Dissertation Abstracts International, Volume: 79-11(E), Section: B.
Advisors: Werner D. Gottwald Committee members: Glenn Bottomly; Sherri Braxton-Lieber.
Özet:
This dissertation is a study of the relationship between neutralization techniques, expertise, and intent to violate security policy. Organizations rely on security policies to assure the sustainment of confidentiality, integrity, and availability of critical information assets. Through the use of information security education, training, and awareness programs, policy compliance is promoted using negative reinforcements. While the literature has supported the connection between training and compliance, it has not evaluated a model where neutralization techniques are a factor. This study tested the influence of expertise in information security on three neutralization techniques as they relate to a given information security policy. The researcher used a non-experimental correlational design to examine these relationships. An online survey combining two pre-validated instruments was administered by a professional online survey service. In total, 208 responses were received using a probability sampling of workers currently employed in the US who use a computer and are aware of a security policy. Individual and aggregate factor analyses supported rejection of the primary null hypothesis, finding that the relationship between neutralization techniques and intent to violate security policy is influenced by expertise. Null hypotheses of the sub-questions were also rejected, indicating that expertise was a significant influence when specific neutralization techniques were evaluated. Future research should continue to explore the influences of expertise in information security and additional relationships between neutralization techniques to security policies. As found by this study, practitioners may improve information security policy compliance by modifying training programs such that they address the decision-making logic used to rationalize intended behavior. Practitioners should also tailor security awareness programs to the changing expertise of the target audience.
Notlar:
School code: 1351
Konu Başlığı:
Tüzel Kişi Ek Girişi:
Mevcut:*
Yer Numarası | Demirbaş Numarası | Shelf Location | Lokasyon / Statüsü / İade Tarihi |
---|---|---|---|
XX(695174.1) | 695174-1001 | Proquest E-Tez Koleksiyonu | Arıyor... |
On Order
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
:
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.