Towards Understanding User Behavioral Intentions to Use IT Security: Examining the Impact of IT Security Psychological Climate and Individual Beliefs

The advent of technologies such as the Internet, intranets, EDI and extranets moves IT from the locked backroom into offices and homes globally, often placing internal users in an integral role for information security. Consequently, there is a growing need to better understand what influences user behavior for comprehensive IT security development. A complementary view to understanding the influences of user behavior is the organizational context within which users act. Investigating both influences of user behavior and organizational context simultaneously is proposed to best answer the recent calls to use a socio-organizational approach in IT security research. Two prominent bodies of research, the theory of planned behavior (Ajzen, 1991) used to frame the influences of user behavior and the organizational behavioral contextual concept of psychological climate, are integrated to develop a multidimensional facet-specific IT security model.

[1]  Qing Hu,et al.  Is spyware an Internet nuisance or public menace? , 2005, CACM.

[2]  Robert D Austin,et al.  The myth of secure computing. , 2003, Harvard business review.

[3]  X. Koufteros Testing a model of pull production: a paradigm for manufacturing research using structural equation modeling , 1999 .

[4]  B. Schneider Organizational Climates: An Essay. , 1975 .

[5]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[6]  Viswanath Venkatesh,et al.  Gender and age differences in employee decisions about new technology: an extension to the theory of planned behavior , 2005, IEEE Transactions on Engineering Management.

[7]  Wesley W. Chu,et al.  Protecting Private Information in Online Social Networks , 2008, Intelligence and Security Informatics.

[8]  Richard A. Guzzo,et al.  Creating a climate and culture for sustainable organizational change , 1996 .

[9]  Julie D Nosworthy,et al.  Implementing Information Security In The 21st Century Do You Have the Balancing Factors? , 2000, Comput. Secur..

[10]  Sebastiaan H. von Solms,et al.  Information Security - A Multidimensional Discipline , 2001, Comput. Secur..

[11]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[12]  Denise M. Rousseau,et al.  The construction of climate in organizational research. , 1988 .

[13]  I. Ajzen The theory of planned behavior , 1991 .

[14]  Christopher P. Parker,et al.  Relationships between psychological climate perceptions and work outcomes: a meta-analytic review , 2003 .

[15]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[16]  C. Cooper,et al.  International review of industrial and organizational psychology , 1986 .

[17]  Paul A. Pavlou,et al.  Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..

[18]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..