Select Page
Research library
|

Information security conscious care behaviour formation in organizations

Technological solutions alone can’t assure information security. User behavior plays a pivotal role in this field. Given its vast expanse, the Internet offers numerous possibilities for security infringements. Attackers utilize various methods to alter the confidentiality, integrity, and availability of information for their advantage. Security infringements often happen due to user negligence, ignorance, lack of awareness, mischief, apathy, or resistance. The primary issue lies in poor information security behavior among users. This paper suggests a model intended to minimize the risks associated with user behavior. The findings reveal that Information Security Awareness, Organization Policy, Experience and Involvement, Attitude, Subjective Norms, Threat Appraisal, and Self-Efficacy positively impact user behavior. However, Perceived Behavioral Control doesn’t significantly influence user behavior. The research model is fundamentally based on the Protection Motivation Theory and the Theory of Planned Behavior.

You May Also Like