Skip to main content

Table 6 Studies on the behavioural Security in Organizational Context

From: Patients’ perception of the information security management in health centers: the role of organizational and human factors

Study

Antecedents of Security

Dependent variable

Respondents

[79]

Mandatoriness

Precautions Taken

Employees (system Users)

[80]

Mimetic Pressure, Coercive Pressure, Normative Pressure

Level of information security control resources

Employees (system Users)

[81]

Perceived certainty and severity of sanctions, Attachment, Commitment, Involvement, Belief, Subjective Norm, Co-worker Behavior

IS security policyviolation Intention

Employees (system Users)

[11]

Perceived certainty of sanctions, PerceivedSeverity of sanctions,

IS misuse intention

Employees (system Users)

[82]

Self-Efficacy, Attitude, Normative Beliefs

Intention to resist social engineering

Employees (system Users)

[83]

Organizational Sanctions, Workgroup sanctions

intention to violate information security

Employees (system Users)

[67]

Organizational commitment, Self-Efficacy, Security Policy Attitude, Punishment Severity, Detection Certainty, Subjective Norm, Descriptive Norm.

Security Policy Compliance Intention

Employees (system Users)

[84]

Self-control

Information Security Violations

Undergraduate students

[85]

Perceived vulnerability, Perceived severity, Response efficacy, Response cost, Self-efficacy, Attitude towardcompliance with ISSP, Subjective norms

Information security compliancebehavioral intention

business managers and IS professionals

[68]

Attitude toward information security compliance, Subjective norms, self-efficacy, Locus of control

compliance behavioral intentions

Employees (system Users)

[86]

Perceived threat Severity and certainty, ResponseEfficacy, Self-Efficacy, Perceived Cost, Vendor support, IT Budget, Firm Size

Intention to Adopt Anti-malware by SME Executives

Information systems experts

[87]

Perceived susceptibility, Perceived severity, Perceived benefits, Perceived barriers, Cues to action, General security orientation, Self-efficacy,

Computer security behavior

Employees (system Users)

[88]

Conservative Behavior, Exposure to Offence, Risk Perception

IS users’ risky behaviors threatening information security

IS users’

[89]

Self-Efficacy in Information Security

Security Practice Technology, Intention to Strengthen Security Effort, Security Practice Care Behavior

Business management students

[90]

Severity, Vulnerability, Response efficacy, Self-efficacy, Attitude, Normative beliefs, Rewards

Intention to comply with information security policies

Employees (system Users)

[91]

Intention, Trust, Organization Support,

Information security knowledge sharing

Employees (system Users)

[92]

Attitude, subjective norm, behavioral control, Threat appraisal, Self-Efficacy

Information security conscious care behavior

Employees (system Users)

[93]

Information security knowledge sharing, Information security collaboration, Information security intervention, Information security experience, Attachment, Commitment, Personal norms, Attitude

attitude towards compliance with information security policy compliance

Employees (system Users)

[94]

Perceived severity, Perceived vulnerability, Response efficacy, Self-efficacy, Perceived realism, Response cost, Rewards

Intention to IS security compliance

Employees (system Users)

[16]

Data Evaluation, Risk Analysis, Training, Integration, Policies, Legislation/Regulation, Architecture

Human Resource IS security

No data collection/No respondents