Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

CCE Theses and Dissertations

Information science

Articles 1 - 2 of 2

Full-Text Articles in Library and Information Science

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James Jan 2023

A Study Of The Effect Of Types Of Organizational Culture On Information Security Procedural Countermeasures, Sheri James

CCE Theses and Dissertations

This study examined the impact of specific organizational cultures on information security procedural countermeasures (ISPC). With increasing security incidents and data breaches, organizations acknowledge that people are their greatest asset as well as a vulnerability. Previous research into information security procedural controls has centered on behavioral, cognitive, and social theories; some literature incorporates general notions of organization culture yet there is still an absence in socio-organizational studies dedicated to elucidating how information security policy (ISP) compliance can be augmented by implementing comprehensive security education, training, and awareness (SETA) programs focusing on education, training, and awareness initiatives.

A theoretical model was …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …