Skip to main content

Advertisement

Table 6 Studies on the behavioural Security in Organizational Context

From: Patients’ perception of the information security management in health centers: the role of organizational and human factors

Study Antecedents of Security Dependent variable Respondents
[79] Mandatoriness Precautions Taken Employees (system Users)
[80] Mimetic Pressure, Coercive Pressure, Normative Pressure Level of information security control resources Employees (system Users)
[81] Perceived certainty and severity of sanctions, Attachment, Commitment, Involvement, Belief, Subjective Norm, Co-worker Behavior IS security policyviolation Intention Employees (system Users)
[11] Perceived certainty of sanctions, PerceivedSeverity of sanctions, IS misuse intention Employees (system Users)
[82] Self-Efficacy, Attitude, Normative Beliefs Intention to resist social engineering Employees (system Users)
[83] Organizational Sanctions, Workgroup sanctions intention to violate information security Employees (system Users)
[67] Organizational commitment, Self-Efficacy, Security Policy Attitude, Punishment Severity, Detection Certainty, Subjective Norm, Descriptive Norm. Security Policy Compliance Intention Employees (system Users)
[84] Self-control Information Security Violations Undergraduate students
[85] Perceived vulnerability, Perceived severity, Response efficacy, Response cost, Self-efficacy, Attitude towardcompliance with ISSP, Subjective norms Information security compliancebehavioral intention business managers and IS professionals
[68] Attitude toward information security compliance, Subjective norms, self-efficacy, Locus of control compliance behavioral intentions Employees (system Users)
[86] Perceived threat Severity and certainty, ResponseEfficacy, Self-Efficacy, Perceived Cost, Vendor support, IT Budget, Firm Size Intention to Adopt Anti-malware by SME Executives Information systems experts
[87] Perceived susceptibility, Perceived severity, Perceived benefits, Perceived barriers, Cues to action, General security orientation, Self-efficacy, Computer security behavior Employees (system Users)
[88] Conservative Behavior, Exposure to Offence, Risk Perception IS users’ risky behaviors threatening information security IS users’
[89] Self-Efficacy in Information Security Security Practice Technology, Intention to Strengthen Security Effort, Security Practice Care Behavior Business management students
[90] Severity, Vulnerability, Response efficacy, Self-efficacy, Attitude, Normative beliefs, Rewards Intention to comply with information security policies Employees (system Users)
[91] Intention, Trust, Organization Support, Information security knowledge sharing Employees (system Users)
[92] Attitude, subjective norm, behavioral control, Threat appraisal, Self-Efficacy Information security conscious care behavior Employees (system Users)
[93] Information security knowledge sharing, Information security collaboration, Information security intervention, Information security experience, Attachment, Commitment, Personal norms, Attitude attitude towards compliance with information security policy compliance Employees (system Users)
[94] Perceived severity, Perceived vulnerability, Response efficacy, Self-efficacy, Perceived realism, Response cost, Rewards Intention to IS security compliance Employees (system Users)
[16] Data Evaluation, Risk Analysis, Training, Integration, Policies, Legislation/Regulation, Architecture Human Resource IS security No data collection/No respondents