dc.contributor.author |
Balozian, Puzant |
|
dc.contributor.author |
Leidner, Dorothy |
|
dc.contributor.author |
Warkentin, Merrill |
|
dc.date.accessioned |
2017-09-07T11:32:18Z |
|
dc.date.available |
2017-09-07T11:32:18Z |
|
dc.date.copyright |
2019 |
en_US |
dc.date.issued |
2017-09-07 |
|
dc.identifier.issn |
0887-4417 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/6155 |
en_US |
dc.description.abstract |
Modern organizations face significant information security threats, to which they respond with various managerial techniques. It is widely believed that “one size does not fit all” for achieving employee information security policy compliance; nevertheless, it is yet to be determined which techniques work best to different organizational employees. We further this research stream by finding that different levels of users might be effectively motivated by different types of coercive and empowering techniques that are suitable to their level and position in the organizational chart. Our results suggest that participation in the ISP decision-making process might prove to be a more effective approach to motivate lower-level employees toward compliance and that enhancing the meaningfulness of policy compliance could be the preferred method among higher levels of management. Members within each level of the organization can be effectively influenced to comply with ISPs when such strategies are customized for their level. |
en_US |
dc.language.iso |
en |
en_US |
dc.title |
Managers’ and employees’ differing responses to security approaches |
en_US |
dc.type |
Article |
en_US |
dc.description.version |
Published |
en_US |
dc.author.school |
SOB |
en_US |
dc.author.idnumber |
200105333 |
en_US |
dc.author.department |
Department of Information Technology and Operations Management (ITOM) |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.relation.journal |
Journal of Computer Information Systems |
en_US |
dc.journal.volume |
59 |
en_US |
dc.journal.issue |
3 |
en_US |
dc.article.pages |
197-210 |
en_US |
dc.keywords |
Behavioral intention |
en_US |
dc.keywords |
Coercive approach |
en_US |
dc.keywords |
Compliance techniques |
en_US |
dc.keywords |
Empowering approach |
en_US |
dc.keywords |
Organizational position |
en_US |
dc.keywords |
Security |
en_US |
dc.keywords |
Security compliance |
en_US |
dc.identifier.doi |
https://doi.org/10.1080/08874417.2017.1318687 |
en_US |
dc.identifier.ctation |
Balozian, P., Leidner, D., & Warkentin, M. (2019). Managers’ and employees’ differing responses to security approaches. Journal of Computer Information Systems, 59(3), 197-210. |
en_US |
dc.author.email |
puzant.balozian@lau.edu.lb |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://www.tandfonline.com/doi/full/10.1080/08874417.2017.1318687 |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-8410-1188 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |