A theory-based review of information security behavior in the organization and home context

Joseph Omidosu*, Jacques Ophoff*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
33 Downloads (Pure)

Abstract

The use of interconnected information and communication systems has broadened computer users' vulnerability to cyber-attacks. However, effective information security measures are dependent on users' willingness to apply available security technologies. Automation of security measures are often recommended, but not all security challenges can be solved in this way. In addition, users often bypass such measures through insecure behaviors. The purpose of this paper is to provide a systematic review of academic literature, analyzing existing research on information security behavior. The findings are synthesized to produce a theory-based perspective, indicating the dominant theoretical approaches used to date. It is found that limited research attention has been given to information security behavior in the home context. Our findings motivate for further research into information security beyond technical issues and the organizational context.

Original languageEnglish
Title of host publicationProceedings of 2016 Third International conference on advances in computing, communication and engineering, ICACCE 2016, 28-29 November 2016, Durban, South Africa
EditorsVishal Kumar, Upasana Gitanjali Singh, S D Sudarsan
PublisherIEEE
Pages225-231
Number of pages7
ISBN (Electronic)9781509025763, 9781509025756
ISBN (Print)9781509025770
DOIs
Publication statusPublished - Nov 2016
Externally publishedYes
Event3rd International Conference on Advances in Computing, Communication and Engineering - Durban, South Africa
Duration: 28 Nov 201629 Nov 2016
Conference number: 3rd

Conference

Conference3rd International Conference on Advances in Computing, Communication and Engineering
Abbreviated titleICACCE 2016
CountrySouth Africa
CityDurban
Period28/11/1629/11/16

Fingerprint Dive into the research topics of 'A theory-based review of information security behavior in the organization and home context'. Together they form a unique fingerprint.

Cite this