.

Managers’ and employees’ differing responses to security approaches

LAUR Repository

Show simple item record

dc.contributor.author Balozian, Puzant
dc.contributor.author Leidner, Dorothy
dc.contributor.author Warkentin, Merrill
dc.date.accessioned 2017-09-07T11:32:18Z
dc.date.available 2017-09-07T11:32:18Z
dc.date.copyright 2019 en_US
dc.date.issued 2017-09-07
dc.identifier.issn 0887-4417 en_US
dc.identifier.uri http://hdl.handle.net/10725/6155 en_US
dc.description.abstract Modern organizations face significant information security threats, to which they respond with various managerial techniques. It is widely believed that “one size does not fit all” for achieving employee information security policy compliance; nevertheless, it is yet to be determined which techniques work best to different organizational employees. We further this research stream by finding that different levels of users might be effectively motivated by different types of coercive and empowering techniques that are suitable to their level and position in the organizational chart. Our results suggest that participation in the ISP decision-making process might prove to be a more effective approach to motivate lower-level employees toward compliance and that enhancing the meaningfulness of policy compliance could be the preferred method among higher levels of management. Members within each level of the organization can be effectively influenced to comply with ISPs when such strategies are customized for their level. en_US
dc.language.iso en en_US
dc.title Managers’ and employees’ differing responses to security approaches en_US
dc.type Article en_US
dc.description.version Published en_US
dc.author.school SOB en_US
dc.author.idnumber 200105333 en_US
dc.author.department Department of Information Technology and Operations Management (ITOM) en_US
dc.description.embargo N/A en_US
dc.relation.journal Journal of Computer Information Systems en_US
dc.journal.volume 59 en_US
dc.journal.issue 3 en_US
dc.article.pages 197-210 en_US
dc.keywords Behavioral intention en_US
dc.keywords Coercive approach en_US
dc.keywords Compliance techniques en_US
dc.keywords Empowering approach en_US
dc.keywords Organizational position en_US
dc.keywords Security en_US
dc.keywords Security compliance en_US
dc.identifier.doi https://doi.org/10.1080/08874417.2017.1318687 en_US
dc.identifier.ctation Balozian, P., Leidner, D., & Warkentin, M. (2019). Managers’ and employees’ differing responses to security approaches. Journal of Computer Information Systems, 59(3), 197-210. en_US
dc.author.email puzant.balozian@lau.edu.lb en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url https://www.tandfonline.com/doi/full/10.1080/08874417.2017.1318687 en_US
dc.orcid.id https://orcid.org/0000-0002-8410-1188 en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account