One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions
نویسندگان
چکیده
Employees’ non-compliance with information systems (IS) security policies is a key concern for organizations. Previous studies have proposed different explanations for employees’ behavior, such as the use of sanctions and monitoring, fear appeal and training, which represent different paradigms of learning. Previous works do not test the validity of their models or methods across different cultural settings. Based on interviews in four countries, we argue that while information security behaviors are learned, different paradigms of learning are effective in different cultures; i.e., different cultures require different IS security interventions. What is even more important is that by providing non-preferred IS security interventions (e.g., monitoring/sanctions in Switzerland) were negative for improving information security. This study has implications for IS security research, editors, and practitioners. For scholars, we urge them to not only validate, but also test their models in different countries. The implication for editors is the need to re-consider their reviewing policy and accept papers that also show the limits of their model (not positive results) in some countries. From a managerial perspective, our findings suggest that different cultures require different IS security interventions.
منابع مشابه
Does One Size Fit All? The Impact of Liquidity Requirements on Bank\'s Insolvency: Evidence from Iranian Listed Banks
According to the Basel III regulatory framework, uniform minimum liquidity requirements have been imposed on all types of banks. Using an agent-based model of a banking system, we investigate the effects of liquidity requirements on banks' insolvency under two policy experiments in one of which the minimum liquidity requirements are applied uniformly and in the other differentially across banks...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملDistributed Contingency Logic and Security
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
متن کاملIntegrated Security System Based On Security Assertion Markup Language Standard
This paper describes an integrated security system for electronic-government services. Many governments are transforming manual government services to electronic government services. This transformation is in most cases done without involving users of the services. This makes users of these services have little trust in the e-government. Security is in most cases not addressed from the early st...
متن کاملAn epistemology of patient safety research: a framework for study design and interpretation. Part 4. One size does not fit all.
This is the final article in the series on the epistemology of patient safety research, and considers the selection of study design and end points during the planning of an evaluation. The key message of this series is that "one size does not fit all": the nature of the evaluation will depend on logistical and pragmatic constraints, a priori assessment of the probability of benefits and harms, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013