scholarly journals Review of Behavioural Theories in Security Compliance and Research Challenge

10.28945/3722 ◽  
2017 ◽  
Author(s):  
Hiep Pham ◽  
Linda Brennan ◽  
Joan Richardson

Aim/Purpose: Inconsistent findings on the effect of various determinants of cyber security behaviour emphasise the need for further understanding of the applicability of compliance theories. The paper provides a critical review of determinants of users’ cyber security behaviour and establishes directions for future research. Background: Cyber security behaviour has been studied using a range of behavioural theories. Factors from these theories help organisations to develop suitable initiatives to encourage positive compliance from the employees. Contribution: The paper integrates factors that can impact cyber security behaviour from Theory of Planned Behaviour, Protection Motivation Theory, Rational Choice Theory and General Deterrence Theory into an overarching framework for better connection of the theories. Previous studies’ findings were analysed to establish research challenges in the field. Future Research: Future research should investigate the complex interaction between organizational and personal characteristics so that a security program can be developed that can effectively engage employees with security tasks even in demanding work environment.

2022 ◽  
pp. 213-232
Author(s):  
Kwame Simpe Ofori ◽  
Hod Anyigba ◽  
George Oppong Appiagyei Ampong ◽  
Osaretin Kayode Omoregie ◽  
Makafui Nyamadi ◽  
...  

One of the major concerns of organizations in today's networked world is to unravel how employees comply with information security policies (ISPs) since the internal employee has been identified as the weakest link in security policy breaches. A number of studies have examined ISP compliance from the perspective of deterrence; however, there have been mixed results. The study seeks to examine information security compliance from the perspective of the general deterrence theory (GDT) and information security climate (ISC). Data was collected from 329 employees drawn from the five top-performing banks in Ghana and analyzed with PLS-SEM. Results from the study show that security education training and awareness, top-management's commitment for information security, and peer non-compliance behavior affect the information security climate in an organization. Information security climate, punishment severity, and certainty of deterrent were also found to influence employees' intention to comply with ISP. The implications, limitations, and directions for future research are discussed.


2016 ◽  
Vol 9 (11) ◽  
pp. 13 ◽  
Author(s):  
Fazilah Idris ◽  
Mohd Richard Neles Abdullah ◽  
Abdul Razak Ahmad ◽  
Ahmad Zamri Mansor

<p class="apa">There has been little research done on explaining the ethnic tolerance behavior from the perspective of sociological theories. The authors chose rational choice theory and the theory of planned behavior as they are widely used in explaining the human social behaviour. In this article, the theories are used to explain the effects of religion on ethnic tolerance in Malaysia. The authors also reviewed a number of literatures to study how religion is associated with ethnic tolerance. From the rational choice theory perspective, it was found that ethnic tolerance can be influenced by one’s religious belief if those who practice it are reciprocated with the promise of retributions from God. The theory of planned behavior on the other hand suggests that religion can affect behavior, subjective norms and perception on how one deal with ethnic tolerance. It is recommended that the theories are used by future studies in order to further expand knowledge base on the subject of ethnic tolerance. This study provides ways and means to inculcate ethnic integration in Malaysia and helps to diffuse religious and ethnic prejudices.</p>


Author(s):  
Kwame Simpe Ofori ◽  
Hod Anyigba ◽  
George Oppong Appiagyei Ampong ◽  
Osaretin Kayode Omoregie ◽  
Makafui Nyamadi ◽  
...  

One of the major concerns of organizations in today's networked world is to unravel how employees comply with information security policies (ISPs) since the internal employee has been identified as the weakest link in security policy breaches. A number of studies have examined ISP compliance from the perspective of deterrence; however, there have been mixed results. The study seeks to examine information security compliance from the perspective of the general deterrence theory (GDT) and information security climate (ISC). Data was collected from 329 employees drawn from the five top-performing banks in Ghana and analyzed with PLS-SEM. Results from the study show that security education training and awareness, top-management's commitment for information security, and peer non-compliance behavior affect the information security climate in an organization. Information security climate, punishment severity, and certainty of deterrent were also found to influence employees' intention to comply with ISP. The implications, limitations, and directions for future research are discussed.


2020 ◽  
Vol 12 (15) ◽  
pp. 6023
Author(s):  
Zachary Oliphant ◽  
Chae M. Jaynes ◽  
Richard K. Moule Jr.

Faced with the depletion of natural resources and climate change, individuals making the choice to behave in a more environmentally conscious way is increasingly necessary. Rational choice theory suggests that individuals will only behave in pro-environmental ways if they perceive those actions to align with their own self-interests. Others, however, have highlighted instances where individuals act pro-socially or altruistically, deviating from their own self-interests for the benefit of others. The present study examines whether individuals’ social preferences are associated with engagement in pro-environmental behaviors. Specifically, drawing on a methodology from behavioral economics, we use dictator and ultimatum game behavior to measure social preferences, and we then evaluate whether heterogeneity in social preferences is associated with self-reported pro-environmental behaviors and observed recycling behavior. The results indicate that individual differences in social preferences have a modest association with self-reported pro-environmental behaviors but no association with observed recycling behavior. Self-reported pro-environmental behavior was not associated with observed recycling behavior. We also find that recycling bin proximity to classroom doors increased participation in recycling. This finding demonstrates that individuals are receptive to the proximate opportunity to recycle. This suggests increasing the ease with which people can engage in pro-environmental behaviors, such as recycling, will promote participation in these practices. Overall, our research indicates that social preferences do not seem to drive individuals to act in environmentally friendly ways. This work also provides new opportunities for future research to integrate economic games into the study of pro-environmental behaviors.


1970 ◽  
Vol 5 (1) ◽  
pp. 1-29 ◽  
Author(s):  
Mark Kweku, Mensah Obeng

Using qualitative data gathered in Ghana and China from Ghanaian importers of Chinese products, this paper addresses two major gaps in the social network literature: formation and cessation of network relationships. The study adapts social network theory, social exchange theory, and rational choice theory to argue that networks are purposely established when a party desires a result and set objective(s) it lacks the competence to accomplish. That party will procure the services of a competent person, at a cost, in order to achieve the set objective(s). It is argued that besides the lack of personal capacity, opportunity cost also explains the formation of network relationships. Furthermore, subject to the nature and personal characteristics of the object to be obtained and the parties to the formed network, the relationship may turn out to be eithera one-off transaction or couldbecome an enduring exchange relationship.Formation and Longévité de Relations sur les Réseaux Pratiques de marchands ghanéens important des produits de Chine.RésuméEn s’appuyant sur de données qualitatives collectées au Ghana et en Chine auprès des importateurs de produits chinois, cet article fait le point sur deux lacunes principales qui existent dans la littérature sur les réseaux sociaux: la formation et  la rupture de relations sur les réseaux sociaux. Cette étude, à l’aide de la théorie de réseaux sociaux, la théorie d’échange social et la théorie du choix rationnel, tient que les réseaux sont délibérément établis lorsqu’une partie désire obtenir des résultats mais ne possède pas les compétences pour en atteindre les objectifs définis. Ladite partie engagera les services d’une personne compétente, moyennant un prix, afin d’atteindre lesdits objectifs. Il est soutenu qu’outre le manque de capacité personnelle, le coût d’opportunité explique également la formation de relations sur les réseaux sociaux. Par ailleurs, en fonction de la nature et des caractéristiques personnelles de l’objet [de la relation] et des parties au réseau créé, la relation pourrait être soit une seule transaction ou une relation d’échange durable. 


2014 ◽  
Vol 5 (1) ◽  
pp. 20-32 ◽  
Author(s):  
Jason Dean

Purpose – The paper aims to study the consequences of the development of Islamic marketing on the social construction of Muslim religious identities. Design/methodology/approach – The paper uses Max Weber's ideal-type methodology to analyze actors and strategies in Islamic marketing, as represented by their self-presentation on French-, English- and Arabic-language web sites. Findings – First, the paper argues that by conflating values and preferences, rational choice theory fails to recognize an essential function of values, which govern the relationship between the personal and the social. Second, it describes the emergence of brand markets within traditional Muslim commodity economies. Third, it uses these distinctions, between the personal and the social and between commodity and brand economies, to construct four ideal types of Muslim economic actors: “collectivists”, “differentialists”, “integrationists”, and “entrepreneurs”. Research limitations/implications – The choice of web sites to survey Muslim economic and religious actors favors producers over consumers, religious specialists over laypeople. Future research should include protocols designed to test ways in which Muslims negotiate the conflicting demands of religion, society and economics in their daily lives. Originality/value – In contradistinction to studies that emphasize the influence of Muslim consumer demand on the development of goods and services, this paper shows that economic conditions, notably globalization and market segmentation, affect the way Muslims construct their religious identities.


2018 ◽  
Vol 8 (2) ◽  
pp. 202-219 ◽  
Author(s):  
William J. Ashton ◽  
Rajesh V. Manchanda

Purpose This paper aims to report a research approach that explores how to use evaluations of previous social marketing efforts to assess and guide a new shelterbelt program called Working Tree. By targeting farmers, this new program aims to gain benefits from enhancing and expanding on-farm tree shelterbelts on the Canadian prairies. Design/methodology/approach This paper uses a novel method that relies on secondary data from six completed social marketing cases as data for a comparative analysis with the new program. A conceptual framework is proposed and applied. This framework incorporates process and outcome indicators of evaluation, key dimensions of the rational choice theory and proven practices from experience. Findings Analysis suggests key parameters of the Working Tree program to be appropriate, with some modifications. However, limitations in the data also point to avenues for future research to deepen the authors’ understanding of assessing a new social marketing program in the prelaunch phase. More research is needed on what works, where and why. Research limitations/implications The seven indices are a modest set for comparatives and are not exhaustive. Six selected cases are small samples that are unable to fully reflect the environmental nature of the new program; yet, they contained critical data for the comparative analysis. Financial data are not in constant dollars, which would be needed when further analysis is undertaken. Practical implications This paper illustrates the importance of the evaluation stage of the social marketing process. It demonstrates the practicality of being able to effectively draw upon previous evaluations to inform new program investors and social marketers at the prelaunch stage. Originality/value The conceptual framework and method present a novel approach to use evaluation data to guide new program funding and initiatives. It is offered with the hope that others might draw upon the ideas presented here and advance them.


Author(s):  
Stephen L. Quackenbush ◽  
Thomas R. Guarrieri

Foreign policy analysis has been used effectively to explain the use of force. Several leading approaches and paradigms help explain the use of force as a tool of foreign policy. These approaches are based on the important preliminary step of opening up the black box of state, which highlights the importance of decision making for explaining international politics. The two primary approaches to explaining foreign policy analysis are rational choice theory and psychological theories. Foreign policy analysis opens the door to a variety of novel and interesting topics. Many topics of domestic politics relate to international conflict, including democratic peace theory, selectorate theory, public opinion, domestic institutions, and leaders. Each of these topics is important for explaining the use of force in foreign policy. Future research on the use of force and international conflict should account for the importance of domestic politics. Studies of leaders, selectorate theory, and the bargaining model of war provide especially promising avenues for future research.


OUGHTOPIA ◽  
2020 ◽  
Vol 35 (2) ◽  
pp. 247-282
Author(s):  
In-Kyun Kim ◽  
Myeong-Geon Koh

Author(s):  
Kealeboga J Maphunye

This article examines South Africa's 20-year democracy by contextualising the roles of the 'small' political parties that contested South Africa's 2014 elections. Through the  prism  of South  Africa's  Constitution,  electoral legislation  and the African Charter on Democracy, Elections and Governance, it examines these parties' roles in South Africa's democratisation; their influence,  if any, in parliament, and whether they play any role in South Africa's continental or international engagements. Based on a review of the extant literature, official documents,  legislation, media, secondary research, reports and the results of South Africa's elections, the article relies on game theory, rational choice theory and theories of democracy and democratic consolidation to examine 'small' political parties' roles in the country's political and legal systems. It concludes that the roles of 'small' parties in governance and democracy deserve greater recognition than is currently the case, but acknowledges the extreme difficulty experienced by the 'small'  parties in playing a significant role in democratic consolidation, given their formidable opponent in a one-party dominant system.


Sign in / Sign up

Export Citation Format

Share Document