Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study

نویسندگان

  • Petri Puhakainen
  • Mikko T. Siponen
چکیده

1. In your opinion, what are the most common ways malicious software (viruses etc.) gets into our company’s network? 2. Where can you find our company’s official information security instructions? 3. Have you applied the instructions concerning SC’s e-mail use to your work? If yes, give some examples of what instructions and for what purposes they were used. 4. Did you find the instructions useful for your purposes? Were they easy to understand and use in practice? Why or why not? 5. Explain briefly the purpose of our company’s information classification rules. 6. How have you applied the information classification rules in your work (i.e., in practice)? 7. How much time do you spend processing e-mail (company’s e-mail account) on a weekly basis? (Your best estimate) 8. For what purposes do you use e-mail in your work? 9. What do you consider as acceptable use of our company’s e-mail system? 10. Give examples of what you consider unacceptable use of our company’s e-mail system? 11. Have you ever encountered malicious software in e-mail attachments? Did this happen at SC or somewhere else? Explain what happened. 12. Have you ever followed (clicked and opened a page) a specially crafted, malicious link in an e-mail message? Did this happen at SC or somewhere else? What happened? 13. How many spam messages do you receive at our company’s e-mail account (e.g., on a weekly basis)? Also give an estimate of how many received messages (e.g., percentage) are spam. Have you ever tried to answer any of the spam messages? 14. In your opinion, by what means is it possible to distinguish relevant e-mail messages from spam or other possibly dangerous messages? 15. By what means would you ensure it is safe to open an e-mail attachment?

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition

This study investigated employees’ information systems security policy (ISSP) compliance behavioural intentions in organisations from the theoretical lenses of social bonding, social influence, and cognitive processing. Given that previous research on ISSP compliance has been based on deterrence theory, this study seeks to augment and diversify research on ISSP compliance through its theoretica...

متن کامل

A Constructive Approach to Information Systems Security Training: An Action Research Experience

Information systems (IS) security breaches cause significant losses to organizations worldwide. Many approaches have been introduced in order to improve employees’ security behavior. Earlier research shows that only seven out of 59 approaches are based on sound theoretical background, and the research in the area of IS security awareness and security behavior has neglected the use of relevant t...

متن کامل

Hacking a Bridge: An Exploratory Study of Compliance-based Information Security Management in Banking Organization

This work is approached through the lens of compliant security by drawing on the concepts of neutralization theory, a prominent postulation in the criminology domain and the ‘big five’ personality construct. This research is conducted based on a case study of ISO/IEC27001 Standard certified banks, to empirically evaluate the link between cybersecurity protocols violation and how employees ratio...

متن کامل

One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions

Employees’ non-compliance with information systems (IS) security policies is a key concern for organizations. Previous studies have proposed different explanations for employees’ behavior, such as the use of sanctions and monitoring, fear appeal and training, which represent different paradigms of learning. Previous works do not test the validity of their models or methods across different cult...

متن کامل

Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale

Purpose – Employees’ compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security. Design/methodology/approach – This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a ...

متن کامل

Introduction to Confidentiality, Integrity, and Availability of Knowledge and Data Minitrack

During the five years of existence of this minitrack, we have published fourteen papers that focus on the intersection of knowledge management and organizational or individual security. Ilvonen, Jusilla, Kärkkäinen, and Paivarint (2015), Ilvonen, Alnne, Helander, and Vayrunen (2016), and Sarigianni, Thallmann, and Manhart (2016) focus on how to protect shared knowledge either within the organiz...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • MIS Quarterly

دوره 34  شماره 

صفحات  -

تاریخ انتشار 2010