File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.25300/MISQ/2013/37.4.09
- Scopus: eid_2-s2.0-84887697195
- WOS: WOS:000329756800010
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
Title | Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors |
---|---|
Authors | |
Keywords | Cluster analysis Theory of diversity Taxonomy Systematics Protection-motivated behaviors Multidimensional scaling Behavioral information security |
Issue Date | 2013 |
Citation | MIS Quarterly: Management Information Systems, 2013, v. 37, n. 4, p. 1189-1210 How to Cite? |
Abstract | Protecting information from a variety of security threats is a daunting organizational activity. Organization managers must recognize the roles that organization insiders have in protecting information resources rather than solely relying upon technology to provide this protection. Unfortunately, compared to negative insider behaviors, the extant literature provides sparse coverage of beneficial insider activities. The few beneficial activities in the literature represent only a small portion of the diverse collection of insiders' protective actions. This research focuses on protection-motivated behaviors (PMBs), which are volitional behaviors enacted by organization insiders to protect (1) organizationally relevant information and (2) the computer-based information systems in which the information is stored, collected, disseminated, and/or manipulated from information security threats. Based on systematics, we propose a six-step methodology of qualitative and quantitative approaches to develop a taxonomy and theory of diversity for PMBs. These approaches integrate the classification techniques of multidimensional scaling (MDS), property fitting (ProFit), and cluster analyses. We leverage these techniques to identify and display how insiders collectively classify 67 unique PMBs and their homogeneous classes. Our taxonomy provides researchers and practitioners a comprehensive guide and common nomenclature for PMBs. Our methodology can be similarly used to create other theories of diversity. |
Persistent Identifier | http://hdl.handle.net/10722/233830 |
ISSN | 2023 Impact Factor: 7.0 2023 SCImago Journal Rankings: 4.105 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Posey, Clay | - |
dc.contributor.author | Roberts, Tom L. | - |
dc.contributor.author | Lowry, Paul Benjamin | - |
dc.contributor.author | Bennett, Rebecca J. | - |
dc.contributor.author | Courtney, James F. | - |
dc.date.accessioned | 2016-09-27T07:21:45Z | - |
dc.date.available | 2016-09-27T07:21:45Z | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | MIS Quarterly: Management Information Systems, 2013, v. 37, n. 4, p. 1189-1210 | - |
dc.identifier.issn | 0276-7783 | - |
dc.identifier.uri | http://hdl.handle.net/10722/233830 | - |
dc.description.abstract | Protecting information from a variety of security threats is a daunting organizational activity. Organization managers must recognize the roles that organization insiders have in protecting information resources rather than solely relying upon technology to provide this protection. Unfortunately, compared to negative insider behaviors, the extant literature provides sparse coverage of beneficial insider activities. The few beneficial activities in the literature represent only a small portion of the diverse collection of insiders' protective actions. This research focuses on protection-motivated behaviors (PMBs), which are volitional behaviors enacted by organization insiders to protect (1) organizationally relevant information and (2) the computer-based information systems in which the information is stored, collected, disseminated, and/or manipulated from information security threats. Based on systematics, we propose a six-step methodology of qualitative and quantitative approaches to develop a taxonomy and theory of diversity for PMBs. These approaches integrate the classification techniques of multidimensional scaling (MDS), property fitting (ProFit), and cluster analyses. We leverage these techniques to identify and display how insiders collectively classify 67 unique PMBs and their homogeneous classes. Our taxonomy provides researchers and practitioners a comprehensive guide and common nomenclature for PMBs. Our methodology can be similarly used to create other theories of diversity. | - |
dc.language | eng | - |
dc.relation.ispartof | MIS Quarterly: Management Information Systems | - |
dc.subject | Cluster analysis | - |
dc.subject | Theory of diversity | - |
dc.subject | Taxonomy | - |
dc.subject | Systematics | - |
dc.subject | Protection-motivated behaviors | - |
dc.subject | Multidimensional scaling | - |
dc.subject | Behavioral information security | - |
dc.title | Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.25300/MISQ/2013/37.4.09 | - |
dc.identifier.scopus | eid_2-s2.0-84887697195 | - |
dc.identifier.volume | 37 | - |
dc.identifier.issue | 4 | - |
dc.identifier.spage | 1189 | - |
dc.identifier.epage | 1210 | - |
dc.identifier.eissn | 2162-9730 | - |
dc.identifier.isi | WOS:000329756800010 | - |
dc.identifier.issnl | 0276-7783 | - |