Identification of the Employee's Mental Patterns about the Policies of Information Security

Publish Year: 1395
نوع سند: مقاله ژورنالی
زبان: English
View: 156

This Paper With 16 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JITM-8-2_003

تاریخ نمایه سازی: 26 بهمن 1400

Abstract:

The security of information systems is one of the most important challenges for today's organizations. Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not agree with the organization security policies. Therefore, the field of end users security behaviors in the organization has received serious attention. In accordance with recent studies, end users have different security perspectives which have weakened the monitoring of user's security behaviors. Using Q methodology, this research attempted to identify employees’ mental patterns regarding information security policies to lead employees with the security requirements of the organization. In this regard, by reviewing previous researches as well as evaluating and summing up the discourse space, Q statements were selected and ranked by ۳۱ employees of petroleum products Distribution Company. Constantly, analysis statements and four mental patterns were identified and classified as assessors, committed, relatives and people who consider deterrence tools helpful in line with information security policies.

Keywords:

Acceptance Information Security Policy , Mental Models , National Iranian oil products distribution company , Q methodology

Authors

ریحانه زهرا اسفندیارپور

Ph.D. Student in system Management, pardis farabi of Management University of Tehran, Iran

مرتضی اکبری

Assistant Prof., Faculty of entrepreneurship, Tehran University, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Aytes, K. & Connolly, T .(۲۰۰۳). A research model for ...
  • Brown, S.R., Q (۱۹۹۶). Methodology and Qualitative research. Qualitative Health ...
  • Bulgurcu, B., Cavusoglu, H. & Benbasat, L. (۲۰۰۹). Roles of ...
  • Bulgurcu, B., Cavusoglu, H. & Benbasat, I. (۲۰۱۰). Information security ...
  • Chang, J., Wu, C. & Liu, H. (۲۰۱۲).The Effects of ...
  • Cheng, L., Li, Y., Li, W., Holmc, E. & Zhai, ...
  • Corr, S. (۲۰۰۱). An introduction to Q methodology, a Research ...
  • Furnell, S., Gennatou, M. & Dowland P. S. (۲۰۰۲). A ...
  • Furnell, S. M. (۲۰۰۵). Why users cannot use security. Computers ...
  • Ifinedo, P. (۲۰۱۲). Understanding information systems security policy compliance: An ...
  • Ifinedo, P. (۲۰۱۴). Information systems security policy compliance: An empirical ...
  • Kalantari, KH. (۲۰۰۳). Data processing and analysis of socio-economic research. ...
  • Koshgoyanfard, A. (۲۰۰۷). Q methodology. Tehran: IRIB Research Center ...
  • (in Persian)Lee, J. & Lee, Y. (۲۰۰۲). A holistic model ...
  • Pahnila, S., Siponen, M. & Mahmood, M. (۲۰۰۷). Employees’ Behavior ...
  • Siponen, M., Pahnila, S. & Mahmood, M. (۲۰۰۶). Factors Influencing ...
  • Siponen, M., Mahmood, A. & Pahnila, S. (۲۰۱۴). Employees’ adherence ...
  • Sommestad, T., Hallberg, J., Lundholm, K. & Bengtsson, J. (۲۰۱۳). ...
  • Son, J, (۲۰۱۱). Out of fear or desire? Toward a ...
  • Spurling, P. (۱۹۹۵). Promoting security awareness and commitment. Information Management ...
  • Stanton, J.M., Stam, K.R., Mastrangelo, P.M. & Jolton, J.A. (۲۰۰۵). ...
  • Tejaswini, H. & Rao, R. (۲۰۰۹). Encouraging information security behaviors ...
  • Tejaswini, H. & Rao, R. (۲۰۰۹). Protection motivation and deterrence: a ...
  • Vance, A., Siponen, M. & Pahnila, S. (۲۰۱۲). Motivating IS ...
  • Whitman, M. E. (۲۰۰۴). In defense of the realm: understanding ...
  • نمایش کامل مراجع