Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program

Author(s):  
Youngkeun Choi

Researchers generally believe that organizational control can deter employees' information security deviant behaviors. However, these relationships are not always observed. Based on the cognitive appraisal theory, this study extends the content domain of information security research by examining the moderating effect of power distance orientation, a kind of cultural value, on these relationships. In the results, first, the severity of penalty and the certainty of detection decreases employees' computer abuse. Second, employee power distance orientation moderates the relationships of the severity of penalty with employee computer abuse, such that the negative relationships are stronger for employees with higher power distance orientation. The findings suggest the deterrent function of cultural values employees hold in organizational behavior.


2015 ◽  
Vol 23 (1) ◽  
pp. 20-30 ◽  
Author(s):  
Kent Marett

Purpose – An increasing amount of attention is being paid to the human side of information security programs, leading to research designs that require the manipulation of study variables. The purpose of this paper is to highlight a traditional assessment of such designs, the manipulation check, and examine how its absence can undermine otherwise solid research efforts. Design/methodology/approach – This paper reviews literature from the fields of research methods, organizational behavior and information systems for extant perspectives and viewpoints on manipulation checks, which are then brought into the realm of information security research. Findings – The possible risks involved with failing to perform manipulation checks are discussed, which include a possibility of making Type II errors. The paper provides further insight on the timing, method and manner in which manipulation checks can be performed. Originality/value – A disappointing number of research articles in the area of information security fail to report manipulation checks when they should. This paper seeks to remind researchers to perform this vital assessment and to use the results accordingly.


1978 ◽  
Vol 23 (11) ◽  
pp. 902-902 ◽  
Author(s):  
ARTHUR P. BRIEF

1980 ◽  
Vol 25 (2) ◽  
pp. 166-166
Author(s):  
PATRICK E. CONNOR

1980 ◽  
Vol 25 (1) ◽  
pp. 45-46
Author(s):  
ORLANDO BEHLING

1984 ◽  
Vol 29 (11) ◽  
pp. 903-904
Author(s):  
Stephan J. Motowidlo

1988 ◽  
Vol 33 (4) ◽  
pp. 320-321
Author(s):  
Lawrence K. Williams

Sign in / Sign up

Export Citation Format

Share Document