Effects of Developer Cognitive Style and Motivations on Information Security Policy Compliance

نویسندگان

  • Lakshman Mahadevan
  • Judith C. Simon
  • Thomas O. Meservy
چکیده

Organizations are faced with information loss on a daily basis. Threats such as hacker attacks are mitigated by applying patches, improving encryption routines, closing security loop-holes in a program and keeping a constant vigil on virus and malicious threats with up-to-date scanning techniques. Companies invest millions of dollars to keep such attacks at bay since a loss of up-time to servers could cause a significant loss in customer revenue and thus result in catastrophic losses in customer satisfaction and ultimately profits. Organizations that create or modify software try to deter threats to their applications by providing information security policies that provide guidelines to developers on what best practices need to be adopted to make their applications safe and secure for customer consumption. This study presents a conceptual model for studying how cognitive style impacts software developer motivations as they approach the task of complying with information security policies. The model is informed by the literature on information security awareness, Protection Motivation Theory, Kirton’s adaption-innovation theory and Herzberg’s motivation and hygiene theory.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigate the Effects of Information Security Climate and Psychological Ownership on Information Security Policy Compliance

Currently, information security policy compliance research mainly investigates information security compliant behaviors of employees from general deterrence theory or protection motivation theory. However, these studies focus on the discussions of security specifications in organization and the motivations of individuals’ behaviors but omit the influences of contextual effects on employees’ psy...

متن کامل

Influences of Frame Incongruence on Information Security Policy Outcomes: An Interpretive Case Study

Despite the significant resources organizations devote to information security policies, the policies rarely produce intended outcome. Prior research has sought to explain motivations for non-compliance and suggested approaches for motivating employees for compliance using theories largely derived from psychology. However, the socio-cognitive structures that shape employees’ perceptions of the ...

متن کامل

Investigate the Quality of Social Security Organization Policy-Making on Social Security Pensioners Life Style Changes

This article has been done with aims to investigate impact of the quality of social security organization policy-making on pensioners' life style in that organization in the city of Mahabad and based on the criteria of environmental, Economic, Social, Political, Health, Personal security, life expectancy, housing and other services have been research case that are the most important factors tha...

متن کامل

Information Security Policy Compliance in Higher Education: A Neo-Institutional Perspective

External pressures could be a powerful force that drives the institution of higher education to attain information security policy compliance. Drawing on the Neo-Institutional Theory (NIT), this study examined how the three external expectations: regulative, normative, and cognitive expectations, impel the higher education of the United States to reach information security policy compliance. Th...

متن کامل

Control-Related Motivations and Information Security Policy Compliance: The Effect of Reflective and Reactive Autonomy

Employees’ failures to follow information security policy can be costly to organizations. Organizations implement security controls in order to motivate employees. Many control-related motivations have been explored in information security research (e.g., self-efficacy and behavioral control); however, self-determination has yet to receive attention. Selfdetermination theory is widely used in o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011