3
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      Information security awareness and behavior: a theory-based literature review

      , , , ,
      Management Research Review
      Emerald

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Purpose

          – This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature.

          Design/methodology/approach

          – This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories.

          Findings

          – The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees’ security behavior is presented.

          Research limitations/implications

          – Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum.

          Practical implications

          – This study presents an overview of determinants that have been proven to influence employees’ behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs.

          Originality/value

          – This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees’ security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out.

          Related collections

          Most cited references96

          • Record: found
          • Abstract: found
          • Article: not found

          The theory of planned behavior

          Icek Ajzen (1991)
          Organizational Behavior and Human Decision Processes, 50(2), 179-211
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            User Acceptance of Information Technology: Toward a Unified View

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Self-Reports in Organizational Research: Problems and Prospects

                Bookmark

                Author and article information

                Journal
                Management Research Review
                Emerald
                2040-8269
                November 11 2014
                November 11 2014
                November 11 2014
                November 11 2014
                : 37
                : 12
                : 1049-1092
                Article
                10.1108/MRR-04-2013-0085
                56aca504-568d-4da7-ac8f-3754b9377d2e
                © 2014

                https://www.emerald.com/insight/site-policies

                History

                Comments

                Comment on this article