484 research outputs found
The Impact of Board Structure on Information Security Breaches
This paper investigates the association between the board structure of a firm and the possibility of information security breaches. Building on the agency theory and resource dependence theory, we hypothesize that the board structure could affect the guidance and advice capability of the board on the executives’ decision of information security management. Our results show that the board size and the number of independent directors could increase the possibility of security breaches while the average and heterogeneity of age/tenure could reduce it. Our findings shed lights on the crucial role played by the board when managing information security risks in organizations
Investigating Employees’ Proactive Extra-Role Information Security Behaviors through Security Mindfulness
Connecting mindfulness with organizational information security (InfoSec) is an increasingly attractive research topic. This paper conceptualizes InfoSec mindfulness as a dynamic InfoSec-specific trait evident when handling organizational information assets. We investigate the motivational factors that contribute to InfoSec mindfulness and the effects of InfoSec mindfulness on employees’ proactive extra-role information security behaviors (ISBs), which refers to self-initiated and future-oriented behaviors that go beyond an organization’s information security policies (ISPs) and are independent on rewards or punishments. This paper provides significant theoretical contributions to InfoSec behavioral literature by conceptualizing InfoSec mindfulness and deepening the understanding of proactive extra-role ISBs. We also summarize our research methodology to develop the scale of InfoSec mindfulness and test its validity for our future study
Employees’ workplace cyberloafing: based on the perspective of guanxi
Cyberloafing is the biggest time waster in organization, 69 percent of respondents admitted waste time on non-work related activities each day. This number might be higher in China for a larger population of cyber citizens. Previous Studies have investigated the antecedents from various perspectives, such as organization justice, deterrence and work stressor. No one addressed cyberloafing from the perspective of guanxi, even though the strength of guanxi directly determines the appropriate behavior of employees , and employees are grounded by such behavioral norms. To fill this gap, we proposed a research model from the perspective of guanxi theory to understand employees’ cyberloafing behavior
- …