z-logo
open-access-imgOpen Access
Information security collaboration formation in organisations
Author(s) -
Sohrabi Safa Nader,
Maple Carsten,
Watson Tim,
Furnell Steve
Publication year - 2018
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2017.0257
Subject(s) - affect (linguistics) , business , context (archaeology) , order (exchange) , information security , theory of planned behavior , bond , control (management) , structural equation modeling , personally identifiable information , knowledge management , psychology , computer security , management , computer science , economics , finance , paleontology , communication , machine learning , biology
The protection of organisational information assets requires the collaboration of all employees; information security collaboration (ISC) aggregates the efforts of employees in order to mitigate the effect of information security breaches and incidents. However, it is acknowledged that ISC formation and its development needs more investigation. This research endeavours to show how ISC forms and develops in the context of an organisation based on social bond factors. The social bond theory and theory of planned behaviour describe the effect of social bond factors on the attitude of employees and finally their behaviour regarding collaboration in the domain of information security. The results of the data analysis reveal that personal norms, involvement, and commitment to their organisation significantly influence the employees’ attitude towards ISC intention. However, contrary to the authors expectation, attachment does not influence the attitude of employees towards ISC. In addition, attitudes towards ISC, perceived behavioural control, and personal norms significantly affect the intention of employees towards ISC. The findings also show that the employees’ intention towards ISC and organisational support positively influence ISC, but that trust does not significantly affect ISC behaviour.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here