Security concerns of system users: a proposed study of user preceptions of the adequacy of security measures

Based on previous work on individuals' attitudes and beliefs about their information systems environment, a theoretical model of the determinants of security concern is presented. An approach to testing the main assertions of the model, using a cross-study comparison of security perceptions from two different survey instruments is described. The first study, conducted in 1985-6, used a sample base of 1063 randomly selected Data Processing Management Association members. The second study surveyed 357 end-users in 10 organizations in the 1986-7 time frame. The data elicited by these research questions will be analyzed in the near future, but the analytical procedures are delineated in the article.<<ETX>>

[1]  A. H. Brayfield,et al.  Employee attitudes and employee performance. , 1955, Psychological bulletin.

[2]  Richard Harris,et al.  SMIS Members: A Membership Analysis , 1982, MIS Q..

[3]  Blake Ives,et al.  The measurement of user information satisfaction , 1983, CACM.

[4]  James C. Wetherbe,et al.  Service Support Levels: An Organizational Approach to End-User Computing , 1986, MIS Q..

[5]  Robert W. Zmud,et al.  AN EMPIRICAL INVESTIGATION OF THE DIMENSIONALITY OF THE CONCEPT OF INFORMATION , 1978 .

[6]  Clinton E. White,et al.  The Information Center Concept: A Normative Model and a Study of Six Installations , 1987, MIS Q..

[7]  James C. Wetherbe,et al.  Key issues in information systems management , 1987 .

[8]  L. Lanza-Kaduce,et al.  THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS* , 1988 .

[9]  Thomas Whiteside Computer Capers , 1979 .

[10]  D. Straub Computer abuse and security: Update on an empirical pilot study , 1986, SGSC.

[11]  Martin Herbert,et al.  1985 Opinion Survey of MIS Managers: Key Issues , 1986, MIS Q..

[12]  Houston H. Carr Information Centers: The IBM Model vs. Practice , 1987, MIS Q..

[13]  James C. Wetherbe,et al.  Key Information Systems Issues for the 1980's , 1984, MIS Q..

[14]  Ken Wong,et al.  Computer crime - Risk management and computer security , 1985, Comput. Secur..

[15]  Michelle T. Iaffaldano,et al.  Job satisfaction and job performance: A meta-analysis. , 1985 .

[16]  Sammy W. Pearson,et al.  Development of a Tool for Measuring and Analyzing Computer User Satisfaction , 1983 .

[17]  Maryam Alavi,et al.  Managing the Risks Associated with End-User Computing , 1985, J. Manag. Inf. Syst..

[18]  Michael E. Treacy,et al.  An Empirical Examination of a Causal Model of User Information Satisfaction , 1985, ICIS.

[19]  R Shoor Microcomputer security: back to basics , 1986 .

[20]  David H. Benson A Field Study of End User Computing: Findings and Issues , 1983, MIS Q..

[21]  E. W. Martin Information Needs of Top MIS Managers , 1983, MIS Q..

[22]  M D Buss,et al.  Common sense and computer security. , 1984, Harvard business review.

[23]  Dale Goodhue,et al.  I/S attitudes: toward theoretical and definitional clarity , 2013, DATB.

[24]  E. Burton Swanson,et al.  INFORMATION CHANNEL DISPOSITION AND USE , 1987 .