One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions

نویسندگان

  • Mari Karjalainen
  • Mikko T. Siponen
  • Petri Puhakainen
  • Suprateek Sarker
چکیده

Employees’ non-compliance with information systems (IS) security policies is a key concern for organizations. Previous studies have proposed different explanations for employees’ behavior, such as the use of sanctions and monitoring, fear appeal and training, which represent different paradigms of learning. Previous works do not test the validity of their models or methods across different cultural settings. Based on interviews in four countries, we argue that while information security behaviors are learned, different paradigms of learning are effective in different cultures; i.e., different cultures require different IS security interventions. What is even more important is that by providing non-preferred IS security interventions (e.g., monitoring/sanctions in Switzerland) were negative for improving information security. This study has implications for IS security research, editors, and practitioners. For scholars, we urge them to not only validate, but also test their models in different countries. The implication for editors is the need to re-consider their reviewing policy and accept papers that also show the limits of their model (not positive results) in some countries. From a managerial perspective, our findings suggest that different cultures require different IS security interventions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Does One Size Fit All? The Impact of Liquidity Requirements on Bank\'s Insolvency: Evidence from Iranian Listed Banks

According to the Basel III regulatory framework, uniform minimum liquidity requirements have been imposed on all types of banks. Using an agent-based model of a banking system, we investigate the effects of liquidity requirements on banks' insolvency under two policy experiments in one of which the minimum liquidity requirements are applied uniformly and in the other differentially across banks...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Distributed Contingency Logic and Security

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

متن کامل

Integrated Security System Based On Security Assertion Markup Language Standard

This paper describes an integrated security system for electronic-government services. Many governments are transforming manual government services to electronic government services. This transformation is in most cases done without involving users of the services. This makes users of these services have little trust in the e-government. Security is in most cases not addressed from the early st...

متن کامل

An epistemology of patient safety research: a framework for study design and interpretation. Part 4. One size does not fit all.

This is the final article in the series on the epistemology of patient safety research, and considers the selection of study design and end points during the planning of an evaluation. The key message of this series is that "one size does not fit all": the nature of the evaluation will depend on logistical and pragmatic constraints, a priori assessment of the probability of benefits and harms, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013