Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2014

AUTHORS

Lena Connolly , Michael Lang , Doug Tygar

ABSTRACT

An increasing number of information security breaches in organisations presents a potentially serious threat to the privacy and confidentiality of personal and commercially sensitive data. Recent research shows that human beings are the weakest link in the security chain and the root cause of a great portion of security breaches. In the late 1990’s, a new phenomenon called “information security culture” has emerged as a measure to promote security-cautious behaviour of employees in organisational settings. The concept of information security culture is relatively new and research on the subject is still evolving. This research-in-progress paper contributes to our understanding of this very important topic by offering a conceptualisation of information security culture. Additionally, this study indentifies factors that instigate adverse employee behaviour in organisations. More... »

PAGES

417-430

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-55415-5_35

DOI

http://dx.doi.org/10.1007/978-3-642-55415-5_35

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1026982808


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Business Information Systems, National University of Irelaand Galway, Ireland", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Business Information Systems, National University of Irelaand Galway, Ireland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Connolly", 
        "givenName": "Lena", 
        "id": "sg:person.013644425427.09", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013644425427.09"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Business Information Systems, National University of Irelaand Galway, Ireland", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Business Information Systems, National University of Irelaand Galway, Ireland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lang", 
        "givenName": "Michael", 
        "id": "sg:person.015277401441.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015277401441.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Electrical Engineering and Computer Science, University of California, Berkeley, US", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "Electrical Engineering and Computer Science, University of California, Berkeley, US"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tygar", 
        "givenName": "Doug", 
        "id": "sg:person.011464452455.47", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011464452455.47"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "An increasing number of information security breaches in organisations presents a potentially serious threat to the privacy and confidentiality of personal and commercially sensitive data. Recent research shows that human beings are the weakest link in the security chain and the root cause of a great portion of security breaches. In the late 1990\u2019s, a new phenomenon called \u201cinformation security culture\u201d has emerged as a measure to promote security-cautious behaviour of employees in organisational settings. The concept of information security culture is relatively new and research on the subject is still evolving. This research-in-progress paper contributes to our understanding of this very important topic by offering a conceptualisation of information security culture. Additionally, this study indentifies factors that instigate adverse employee behaviour in organisations.", 
    "editor": [
      {
        "familyName": "Cuppens-Boulahia", 
        "givenName": "Nora", 
        "type": "Person"
      }, 
      {
        "familyName": "Cuppens", 
        "givenName": "Fr\u00e9d\u00e9ric", 
        "type": "Person"
      }, 
      {
        "familyName": "Jajodia", 
        "givenName": "Sushil", 
        "type": "Person"
      }, 
      {
        "familyName": "Abou El Kalam", 
        "givenName": "Anas", 
        "type": "Person"
      }, 
      {
        "familyName": "Sans", 
        "givenName": "Thierry", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-55415-5_35", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-55414-8", 
        "978-3-642-55415-5"
      ], 
      "name": "ICT Systems Security and Privacy Protection", 
      "type": "Book"
    }, 
    "keywords": [
      "information security culture", 
      "security culture", 
      "employee security behaviour", 
      "information security breaches", 
      "security breaches", 
      "employee behavior", 
      "organisational settings", 
      "security behavior", 
      "paper contribute", 
      "organization", 
      "recent research", 
      "cultural factors", 
      "security chain", 
      "human beings", 
      "individual values", 
      "new phenomenon", 
      "important topic", 
      "breach", 
      "research", 
      "employees", 
      "behavior", 
      "root cause", 
      "being", 
      "weak links", 
      "conceptualisation", 
      "measures", 
      "chain", 
      "culture", 
      "greater portion", 
      "link", 
      "threat", 
      "understanding", 
      "subjects", 
      "topic", 
      "concept", 
      "factors", 
      "setting", 
      "values", 
      "contributes", 
      "role", 
      "phenomenon", 
      "confidentiality", 
      "sensitive data", 
      "data", 
      "privacy", 
      "serious threat", 
      "number", 
      "cause", 
      "portion", 
      "security-cautious behaviour", 
      "progress paper contributes", 
      "study indentifies factors", 
      "indentifies factors", 
      "adverse employee behaviour"
    ], 
    "name": "Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values", 
    "pagination": "417-430", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1026982808"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-55415-5_35"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-55415-5_35", 
      "https://app.dimensions.ai/details/publication/pub.1026982808"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:25", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_5.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-55415-5_35"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-55415-5_35'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-55415-5_35'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-55415-5_35'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-55415-5_35'


 

This table displays all metadata directly associated to this object as RDF triples.

151 TRIPLES      23 PREDICATES      80 URIs      73 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-55415-5_35 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nc8e7c0fb82ec49cbac9bff5fdb3d96f3
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description An increasing number of information security breaches in organisations presents a potentially serious threat to the privacy and confidentiality of personal and commercially sensitive data. Recent research shows that human beings are the weakest link in the security chain and the root cause of a great portion of security breaches. In the late 1990’s, a new phenomenon called “information security culture” has emerged as a measure to promote security-cautious behaviour of employees in organisational settings. The concept of information security culture is relatively new and research on the subject is still evolving. This research-in-progress paper contributes to our understanding of this very important topic by offering a conceptualisation of information security culture. Additionally, this study indentifies factors that instigate adverse employee behaviour in organisations.
7 schema:editor Ndde18e044b6043cf8e14630e0f8753da
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Ne7b32adffeec45bcaf8780ddb23d4513
12 schema:keywords adverse employee behaviour
13 behavior
14 being
15 breach
16 cause
17 chain
18 concept
19 conceptualisation
20 confidentiality
21 contributes
22 cultural factors
23 culture
24 data
25 employee behavior
26 employee security behaviour
27 employees
28 factors
29 greater portion
30 human beings
31 important topic
32 indentifies factors
33 individual values
34 information security breaches
35 information security culture
36 link
37 measures
38 new phenomenon
39 number
40 organisational settings
41 organization
42 paper contribute
43 phenomenon
44 portion
45 privacy
46 progress paper contributes
47 recent research
48 research
49 role
50 root cause
51 security behavior
52 security breaches
53 security chain
54 security culture
55 security-cautious behaviour
56 sensitive data
57 serious threat
58 setting
59 study indentifies factors
60 subjects
61 threat
62 topic
63 understanding
64 values
65 weak links
66 schema:name Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values
67 schema:pagination 417-430
68 schema:productId N36b53170a5fb458984ae07b06a1fb8ab
69 N3ba326a9169d43c6a153ad3edb2e74b5
70 schema:publisher N70f7467dbe034dab885b614b90468f7f
71 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026982808
72 https://doi.org/10.1007/978-3-642-55415-5_35
73 schema:sdDatePublished 2022-01-01T19:25
74 schema:sdLicense https://scigraph.springernature.com/explorer/license/
75 schema:sdPublisher Nacd29f4bf4044b45b58afb4bb0219b3d
76 schema:url https://doi.org/10.1007/978-3-642-55415-5_35
77 sgo:license sg:explorer/license/
78 sgo:sdDataset chapters
79 rdf:type schema:Chapter
80 N09d42464200045aca60fbf3a371ef4be schema:familyName Jajodia
81 schema:givenName Sushil
82 rdf:type schema:Person
83 N242a3d6810134f248f1f082f9bff2d85 schema:familyName Sans
84 schema:givenName Thierry
85 rdf:type schema:Person
86 N36b53170a5fb458984ae07b06a1fb8ab schema:name doi
87 schema:value 10.1007/978-3-642-55415-5_35
88 rdf:type schema:PropertyValue
89 N3ba326a9169d43c6a153ad3edb2e74b5 schema:name dimensions_id
90 schema:value pub.1026982808
91 rdf:type schema:PropertyValue
92 N56ed0f5348f64afda9a3560cd322d031 rdf:first N09d42464200045aca60fbf3a371ef4be
93 rdf:rest Ncff9260fb518487086abe11dbbcf1c16
94 N70f7467dbe034dab885b614b90468f7f schema:name Springer Nature
95 rdf:type schema:Organisation
96 N7292e7083ed443c7851efe8cfb8c319c rdf:first Na73877577f8148efbbeb277c806caa6e
97 rdf:rest N56ed0f5348f64afda9a3560cd322d031
98 N930d53a22eb143b89b9022fe6803e9df schema:familyName Cuppens-Boulahia
99 schema:givenName Nora
100 rdf:type schema:Person
101 N9bfe386b385d4abd87849b327b5cd3dd rdf:first sg:person.011464452455.47
102 rdf:rest rdf:nil
103 Na73877577f8148efbbeb277c806caa6e schema:familyName Cuppens
104 schema:givenName Frédéric
105 rdf:type schema:Person
106 Nacd29f4bf4044b45b58afb4bb0219b3d schema:name Springer Nature - SN SciGraph project
107 rdf:type schema:Organization
108 Nbc15d355b9984f92857612bb9c374524 rdf:first N242a3d6810134f248f1f082f9bff2d85
109 rdf:rest rdf:nil
110 Nc8e7c0fb82ec49cbac9bff5fdb3d96f3 rdf:first sg:person.013644425427.09
111 rdf:rest Nff900c44b3db44d9b2f0adba7a29eb77
112 Ncff9260fb518487086abe11dbbcf1c16 rdf:first Ndbb3e7a465744083b0502a7d084c0c09
113 rdf:rest Nbc15d355b9984f92857612bb9c374524
114 Ndbb3e7a465744083b0502a7d084c0c09 schema:familyName Abou El Kalam
115 schema:givenName Anas
116 rdf:type schema:Person
117 Ndde18e044b6043cf8e14630e0f8753da rdf:first N930d53a22eb143b89b9022fe6803e9df
118 rdf:rest N7292e7083ed443c7851efe8cfb8c319c
119 Ne7b32adffeec45bcaf8780ddb23d4513 schema:isbn 978-3-642-55414-8
120 978-3-642-55415-5
121 schema:name ICT Systems Security and Privacy Protection
122 rdf:type schema:Book
123 Nff900c44b3db44d9b2f0adba7a29eb77 rdf:first sg:person.015277401441.84
124 rdf:rest N9bfe386b385d4abd87849b327b5cd3dd
125 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
126 schema:name Information and Computing Sciences
127 rdf:type schema:DefinedTerm
128 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
129 schema:name Data Format
130 rdf:type schema:DefinedTerm
131 sg:person.011464452455.47 schema:affiliation grid-institutes:grid.47840.3f
132 schema:familyName Tygar
133 schema:givenName Doug
134 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011464452455.47
135 rdf:type schema:Person
136 sg:person.013644425427.09 schema:affiliation grid-institutes:None
137 schema:familyName Connolly
138 schema:givenName Lena
139 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013644425427.09
140 rdf:type schema:Person
141 sg:person.015277401441.84 schema:affiliation grid-institutes:None
142 schema:familyName Lang
143 schema:givenName Michael
144 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015277401441.84
145 rdf:type schema:Person
146 grid-institutes:None schema:alternateName Business Information Systems, National University of Irelaand Galway, Ireland
147 schema:name Business Information Systems, National University of Irelaand Galway, Ireland
148 rdf:type schema:Organization
149 grid-institutes:grid.47840.3f schema:alternateName Electrical Engineering and Computer Science, University of California, Berkeley, US
150 schema:name Electrical Engineering and Computer Science, University of California, Berkeley, US
151 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...