Repository logo
 

Unsafe Acts: Factors Influencing the Information Security Behaviours of IT Employees

dc.contributor.advisorHooper, Val
dc.contributor.authorBlunt, Christian
dc.date.accessioned2011-08-31T22:05:16Z
dc.date.accessioned2022-10-30T20:37:11Z
dc.date.available2011-08-31T22:05:16Z
dc.date.available2022-10-30T20:37:11Z
dc.date.copyright2011
dc.date.issued2011
dc.description.abstractHuman error is a significant contributing factor in information security incidents. Therefore it is important for academics and practitioners to perform research into the factors that lead to the introduction of errors and to identify methods of reducing or eliminating them. This research draws on human error theory and health-behaviour models to understand the factors that may influence the information security behaviours of IT employees. Specifically it sets out to identify what influences their intention to comply with, or violate, the information security behaviours required by their organisations. This research is important as IT employees are responsible for the commissioning, management and maintenance of information systems, and errors (in the form of violations) made by them can dramatically reduce the effectiveness of the controls in place to reduce the likelihood and/or impact of an information security incident occurring. It defines and empirically tests a research model which explores the information security behaviours of IT employees and introduces the constructs of previous experience and the ability to choose. This research theorises that ability to choose separates the information security behaviours of IT employees from those of end users. The research identifies that there is a relationship between response costs (the perceived inconvenience of performing the behaviour), response efficacy (the confidence that the behaviour is practical, efficient and effective at delivering the required outcomes), cues to action (the use of security policies and procedures, awareness campaigns and training to influence behaviour), detection (the threat of detection of non-compliant behaviour and the embarrassment associated with it being discovered), ability to choose (the capability to choose whether or not to perform the behaviour), self-efficacy (the belief that they have the necessary skills and are capable of performing the behaviour) and IT employees’ intention to perform the information security behaviours required by their organisations. The results support the theory that there is a distinction to be made between the information security behaviours of IT employees and those of end users. As a result, academics and practitioners need to consider ability to choose (volitional control) as a factor when performing research into information security behaviours.en_NZ
dc.formatpdfen_NZ
dc.identifier.urihttps://ir.wgtn.ac.nz/handle/123456789/26143
dc.languageen_NZ
dc.language.isoen_NZ
dc.publisherTe Herenga Waka—Victoria University of Wellingtonen_NZ
dc.rights.holderAll rights, except those explicitly waived, are held by the Authoren_NZ
dc.rights.licenseAuthor Retains Copyrighten_NZ
dc.rights.urihttps://www.wgtn.ac.nz/library/about-us/policies-and-strategies/copyright-for-the-researcharchive
dc.subjectInformation securityen_NZ
dc.subjectViolationsen_NZ
dc.subjectBehaviouren_NZ
dc.titleUnsafe Acts: Factors Influencing the Information Security Behaviours of IT Employeesen_NZ
dc.typeTexten_NZ
thesis.degree.disciplineInformation Systemsen_NZ
thesis.degree.grantorTe Herenga Waka—Victoria University of Wellingtonen_NZ
thesis.degree.nameMaster of Information Managementen_NZ
vuwschema.contributor.unitSchool of Information Managementen_NZ
vuwschema.subject.marsden289900 Other Information, Computing and Communication Sciencesen_NZ
vuwschema.type.vuwMasters Research Paper or Projecten_NZ

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
thesis.pdf
Size:
1.72 MB
Format:
Adobe Portable Document Format
Description:
Thesis
Loading...
Thumbnail Image
Name:
form.pdf
Size:
72.45 KB
Format:
Adobe Portable Document Format
Description:
Permission Form (Admin)

Collections