How Direct and Vicarious Experience Promotes Security Hygiene

Size: px
Start display at page:

Download "How Direct and Vicarious Experience Promotes Security Hygiene"

Transcription

1 How Direct and Vicarious Experience Promotes Security Hygiene Leigh A. Mutchler Accounting and Information Management University of Tennessee Knoxville, TN, USA Merrill Warkentin Management and Information Systems Mississippi State University Mississippi State, MS, USA Abstract This conference proceedings paper presents part of a larger study that is being prepared for publication in an academic journal. Elements are withheld from the printed version, but will be presented at the conference in Albany. Readers may contact the authors for more information. Keywords computer security hygiene; security behaviors; compliance; direct experience; vicarious experience; SETA programs; protection motivation; PMT; threat; response; social influence; self-efficacy I. INTRODUCTION Information Systems (IS) security practitioners continually struggle to keep abreast of the numerous information security threats that face modern organizations. For example, in 2014 there was a 40% increase in attacks on large companies, including the attacks on Sony, Home Depot, JP Morgan, Uber, and Premera Blue Cross [1-4]. In that same year a record high number of zero-day vulnerabilities such as the Heartbleed Bug was reached [4-6]. Even good news in 2014 was overshadowed by bad news when a report released by Proofpoint [7] reported that while security awareness programs contributed to a 94% decrease in the success rate of phishing attacks, attackers quickly responded with modified attack approaches directed toward new targets. Security threats to an organization come in all shapes and sizes [8, 9] requiring the implementation of both technical and behavioral controls. The policies and procedures regarding expected secure behaviors are documented in the information security policy (ISP). Employees have knowledge of and access to organizational data and systems, and as such are known to be insider threats which in turn makes ensuring their compliance with the ISP particularly complex [10-16]. Many times employee noncompliance with the ISP unintentionally results in threats to the organization. For example, employees who forget to consistently comply with a clean desk policy put corporate information at risk, but the risk is accidental. Employees may not fully understand proper data backup procedures, which creates a risk for data loss, but again this risk is not deliberate. Errors, misunderstandings, and poor judgment will always exist in the workplace, and instructional programs are the typical control applied to protect against unwanted employee behaviors, including ISP compliance behaviors. The instructional program often favored by organizations to ensure employees comply with the ISP is the Security Education, Training, and Awareness (SETA) program [11, 17-19]. The SETA program consists of three levels as summarized in Table 1. The awareness level of SETA instruction is the primary level of interest in this study because it is provided to all employees. Awareness is intended to supply employees with the foundation of information security knowledge necessary to act in a secure manner as they fulfill their job duties. The training level is typically directed toward managers and expands the awareness instruction with a skills component that is anticipated to better prepare supervisory employees to assist subordinate employees. The education level is beyond the scope of this study as it is typically restricted to the IS professionals of an organization. Awareness instruction is generally delivered using a classroom or a self-paced online learning model [19-22]. Awareness often focuses on repetition of the information to keep employees aware of the ever-present security issues. Awareness programs are often reported to be ineffective [10, 23] and are argued by some to be a waste of organizational resources [24]. So what is missing why isn t awareness enough? TABLE I. BEHAVIORAL CONTROL - SECURITY INSTRUCTION SETA Instruction Levels [adapted from 20] EDUCATION TRAINING AWARENESS Attribute Why How What Level: Insight Knowledge Information Learning Objective: Teaching Method: Employee: Impact Timeframe: Understanding Theoretical Instruction IS Professionals IS Management Skill Practical Instruction Non-IS Supervisors Non-IS Managers Recognition and Retention Informational Instruction All Long-term Intermediate Short-term Awareness instruction content is recommended to be delivered at a basic level to better ensure that all employees, regardless of their backgrounds, will be able to understand how to behave in a secure manner. However, there still tends to be a gap between understanding the instruction provided and performing the secure behaviors [25]. Experience may be a key component to close the gap between the instruction and behavior. Take, for example, social engineering which includes phishing and for which instruction is the undisputed primary defense. Chris Hadnagy, a social engineering expert ASIA '15 2

2 [26] recommends adding direct experience to an instruction program because it can greatly improve the outcomes of instruction. He states that phishing awareness instruction that is combined with the direct experience of an internally controlled phishing ruse is more effective and has been shown to drop the future success rate of phishing attacks by more than 75% [27]. For similar reasons, numerous penetration testers are taking advantage of controlled attacks to provide an opportunity to enhance the network staff security instruction with the direct experience of a hack [28]. These cases where information security instruction is enhanced by direct experience leads to the following research question explored in this study: What role does an individual s previous experience with information security play in the individual s secure behavioral intent? The exploration performed in this study included a collection of data through an online survey. Fear appeals and the Protection Motivation Theory (PMT) [29] along with SETA instruction provided the framework for the measures. The goals included gaining a better understanding of the role that experience plays in the behavioral intent to perform secure actions. The presentation of this study continues with a discussion of the background, the model and method, the results, and the conclusions along with insights for future research. II. BACKGROUND AND THEORETICAL SUPPORT Awareness instruction is a persuasive organizational campaign [30-32] with the goal to successfully instruct and encourage employees to perform preferred secure behaviors. The Protection Motivation Theory (PMT) [29, 33] explains that a fear appeal provides information to an individual about a significant threat that is likely to occur, and about an effective response against the threat that can easily be performed by the individual. Fear appeals are messages framed to incite individual concerns and the goal is to persuade the individuals to perform certain behaviors, which fits well within the context of information security instruction. The PMT process model is illustrated in Fig. 1, which shows that an individual will assess the fear appeal information, along with information related to personal experience and other personality characteristics, in order to choose a behavioral response. It is not surprising that an increasing number of researchers, including those of this study, have explored the fit of the fear appeal and PMT within the context of information security. Behavioral research within the context of information security makes up an important part of the research being performed in the field of IS today [14, 36-38]. Individual behaviors, including employee compliance with the ISP, are complex and difficult to predict. An Employee s compliance with the ISP is ultimately a choice they make, therefore organizations need to encourage employees to choose to comply. Human characteristics such as attitudes and beliefs are known to influence choice, and both are known to be influenced by experience [39-41]. An individual s experiences are known to be strong predictors of the acceptance and use of information technology [42, 43], and interaction with information technologies is frequently necessary to comply with procedures documented in the ISP; therefore experience plays a part in the employee s ISP compliance. New employees gain experiences vicariously through observation, and these experiences teach them about the expected behaviors, including how to comply with the ISP [44]. Differing levels of experience with information security threats and responses will affect an employee s choices, technology usage, and ultimately their ISP compliance and should therefore be taken into account when developing information security instructional programs. The SETA program, particularly the awareness level of instruction, is the primary mechanism used by organizations to encourage employee compliance with the ISP. The fear appeal, supported by PMT, provides an appropriate framework for awareness instruction, but an employee s experience should also be taken into account. In this study, the individual direct and vicarious experiences with information security threats and with responses are examined to gain an understanding of the role experience plays with ISP compliance and to determine whether taking into consideration an employee s experience may benefit information security awareness programs. III. RESEARCH MODEL AND HYPOTHESES DEVELOPMENT A fear appeal is a persuasive message that is much like the messages included in awareness instruction programs. Both provide information regarding threats that are severe and likely to occur. Both also provide information regarding recommended responses that work, are not difficult to perform, and do not incur costs that outweigh the performance of the protective response [33, 35, 45]. A fear appeal and its measures are, therefore, appropriate for this study. The fear appeal core constructs included are threat severity (TSU), threat susceptibility (TSV), response efficacy (REF), selfefficacy (SEF), and response cost (RSC). Additionally, social influence (SOC) is included because of the strong influence others can exert on an individual s behavior choices [40], including those regarding the use of technology [42, 46], and their intent to perform secure behaviors [47-52], all of which are relevant to this study. Fig. 1. Protection Motivation Theory Schema [adapted from 34,35] Experience is contextual and in the context of information security issues an individual will have varying levels of experience with threats and with recommended responses. Experience may also be decomposed into direct and vicarious components, and within an exploratory study such as this, examining the components separately will provide the richer understanding desired. A separate analysis of the direct and vicarious components of experience further supported by the PMT process model. Therefore, four elements of experience ASIA '15 3

3 including direct and vicarious threat experience and direct and vicarious response experience, are explored in this study. The objective of this study is to explore the impact of an individual s prior experience on the relationships between the traditional PMT variables and the individual s security hygiene, as represented by his or her behavioral intent to engage in secure behavior. Experience is a known source of influence on the antecedents of behavioral intent, and in the context of this study that influence is proposed to be one of moderation. Due to the exploratory nature of this study, tests for moderation by the experience components on each of the relationships between the core fear appeal constructs and the dependent variable behavioral intent (BEH) were conducted. The research model in Fig. 2 illustrates these predictions, and the specific hypotheses include hypothesis 1a that predicts a moderating influence by DTE on the relationship between TSU and BEH, hypothesis 1b predicts a moderating influence by DRE on the same TSU-BEH relationship, hypothesis 1c predicts a moderating influence by VTE on the TSU-BEH relationship, and 1d predicts a moderating influence by VRE on the relationship between TSU and BEH. H1a-d: The relationship between an individual s perception of threat susceptibility and their reported behavioral intent will be moderated by at least one of the components of experience - direct threat, direct response, vicarious threat, and vicarious response. Similarly hypotheses 2 through 6 predict moderating influences by each of the experience components, DTE, DRE, VTE, and VRE, on the relationships between the remaining core fear appeal constructs TSV, REF, SEF, and RSC and BEH as follows: H2a-d: The relationship between an individual s perception of threat severity and their reported behavioral intent will be H3a-d: The relationship between an individual s perception of response efficacy and their reported behavioral intent will be H4a-d: The relationship between an individual s perception of self-efficacy and their reported behavioral intent will be H5a-d: The relationship between an individual s perception of response cost and their reported behavioral intent will be H6a-d: The relationship between an individual s perception of social influence and their reported behavioral intent will be IV. RESEARCH METHOD AND DATA ANALYSIS (Note: Details of the research design, data collection, and data analysis will be presented at the conference.) Fig. 2. Research Model with Hypothesized Moderating Relationships V. DISCUSSION Our analysis, which will be presented at the conference, suggests evidence of significant interactions by at least one experience variable on each of the relationships between the indicators TSU, TSV, REF, SEF, RSC, and SOC perceptions and the dependent variable, BEH. Direct threat, vicarious threat, and vicarious response experiences were found to act as moderators in more than one relationship, but none of the relationships tested in this study were found to be moderated by direct response experience. Findings and discussion will be presented in Albany. VI. CONCLUSION SETA information security instruction programs are intended to provide employees with an adequate level of instruction so they will be well-equipped to comply with the ISP, yet employee compliance does not always result. This study proposed that a better understanding of the role of prior experience within this context may help to close the gap. Our analysis explored that proposition, and the test results indicate that experience does significantly interact with individual perceptions of threat susceptibility and severity and with perceptions of response efficacy, self-efficacy, response cost, and social influence. No evidence of moderation due to direct response experience was identified, but direct threat experience, vicarious threat experience, and vicarious response experience were found to interact with at least one of the predictor variables, and each of the interactions positively affect the relationships between the predictors and behavioral intent, supporting this study s proposition. Follow-up studies are planned to perform more in-depth examinations of the predictive relationships between the fear appeal core constructs and behavioral intent, combined with examination of the mediations identified here, to better understand the true value of this study s findings and to ultimately better understand the role of experience within this context. ASIA '15 4

4 REFERENCES [1] L. Div, (2015, Jan.), "Lessons from 2014 mega breaches: It's time to shift to a post-breach mindset," Forbes, [On-line], Available: mega-breaches-its-time-to-shift-to-a-post-breach-mindset/, [May 9, 2015]. [2] D. Lewis, (2015, Feb.), "Uber suffers data breach affecting 50,000," Forbes, [On-line], Available: [3] K. Vinton, (2015, Mar.), "Premera Blue Cross breach may have exposed 11 million customers' medical and financial data," Forbes, [On-line], Available: million-customers-medical-and-financial-data-may-have-been-exposedin-premera-blue-cross-breach/, [4] (2015, Apr.), Internet security threat report vol. 20, [On-line], Available: id=istr-20, [May 13, 2015]. [5] (2015, Apr.), "Deceptive new tactics give advanced attackers free reign over corporate networks," InformationWeek, [On-line], Available: [6] J. Johnson, (2015, Jan.), "If 2014 was the year of the data breach, brace for more," Forbes, [On-line], Available: [7] (2014, Sept.), Managing cyber risks in an interconnected world: The global state of information security survey 2015, [On-line], Available: [May 13, 2015] [8] (2015), The human factor 2015: A Proofpoint research report, [Online], Available: [9] K. D. Loch, H. H. Carr, and M. E. Warkentin, Threats to Information Systems: Today's Reality, Yesterday's Understanding, MIS Quarterly, vol. 16, no. 2, pp , [10] M. Warkentin, and L. A. Mutchler, "Behavioral Information Security Management," in Computing Handbook: Information Systems and Information Technology, T. Heikki and A. Tucker, eds., Boca Raton, FL: Taylor & Francis Group, [11] M. A. Davis, (2012, May), 2012 strategic security survey, InformationWeek, [On-line], Available: Strategic-Security-Survey.html, [May 8, 2012]. [12] R. Willison, and M. Warkentin, Beyond deterrence: An expanded view of employee computer abuse, MIS Quarterly, vol. 37, no. 1, pp. 1-20, [13] M. A. Sasse, S. Brostoff, and D. Weirich, Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security, BT Technolgy Journal, vol. 19, no. 3, pp , [14] M. Warkentin, and R. Willison, Behavioral and policy issues in information systems security: The insider threat, European Journal of Information Systems, vol. 18, no. 2, pp , [15] B. Bulgurcu, H. Cavusoglu, and I. Benbasat, Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol. 34, no. 3, pp A7, [16] Y. Chen, K. R. Ramamurthy, and K.-W. Wen, Organizations' information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, vol. 29, no. 3, pp , [17] A. Vance, P. B. Lowrey, and D. Eggett, Using accountability to reduce access policy violations in information systems, Journal of Management Information Systems, vol. 29, no. 4, pp , [18] M. Siponen, A conceptual foundation for organizational information security awareness, Information Management & Computer Security, vol. 8, no. 1, pp , [19] M. E. Thomson, and R. von Solms, Information security awareness: Educating your users effectively, Information Management & Computer Security, vol. 6, no. 4, pp , [20] M. Wilson, D. E. de Zafra, S. I. Pitcher, J. D. Tressler, and J. B. Ippolito, "Information technology security training requirements: A role- and performance-based model," National Institute of Standards and Technology, [21] (2015), "Security awareness training," Internet: [May 9, 2015) [22] M. Wilson, and J. Hash, "Building an information technology security awareness and training program," National Institute of Standards and Technology, [23] R. Richardson (2011, May), 15th annual 2010/2011 computer crime and security survey, InformationWeek, [On-line], Available: csi-survey.html, [Jan. 5, 2012]. [24] B. Schneier, (2013, Mar.), "Security Awareness Training," Schneier on Security, [On-line], Available: ml [May 13, 2015]. [25] (2015), "Wombat Security Technologies," Internet: on% and% training&_bm=p&gclid=cmloikv6vsu CFdQ9gQodnTIAeQ, [May 13, 2015]. [26] SE-Team, (n.d.), "What is social engineering?" [On-line], Available: [May 13, 2015]. [27] J. Stanganelli, (2013, Nov.), "How to fight social engineering," esecurity Planet, [On-line], Available: [May 2015]. [28] S. Northcutt, J. Shenk, D. Shackleford, T. Rosenberg, R. Siles, and S. Mancini, (2006, Nov.), "Penetration testing: Assessing your overall security before attackers do," SANS, [On-line], Available: [May 13, 2015]. [29] R. W. Rogers, A protection motivation theory of fear appeals and attitude change, The Journal of Psychology, vol. 91, pp , [30] M. Karjalainen, and M. Siponen, Toward a new meta-theory for designing information systems (IS) security training approaches, Journal of the Association for Information Systems, vol. 12, no. 8, pp , [31] R. LaRose, N. J. Rifon, and R. Enbody, Promoting personal responsibility for Internet safety, Communications of the ACM, vol. 51, no. 3, pp , [32] P. Puhakainen, and M. Siponen, Improving employees' compliance through information systems security training: An action research study, MIS Quarterly, vol. 34, no. 4, pp. 767-A4, [33] J. E. Maddux, and R. W. Rogers, Protection motivation and selfefficacy: A revised theory of fear appeals and attitude change, Journal of Experimental Social Psychology, vol. 19, pp , [34] P. A. Rippetoe, and R. W. Rogers, Effects of components of protectionmotivation theory on adaptive and maladaptive coping with a health threat, Journal of Personality and Social Psychology, vol. 52, no. 3, pp , [35] D. L. Floyd, S. Prentice-Dunn, and R. W. Rogers, A meta-analysis of research on protection motivation theory, Journal of Applied Social Psychology, vol. 30, pp , [36] J. D Arcy, A. Hovav, and D. Galletta, User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, Information Systems Research, vol. 20, no. 1, pp , [37] L. Myyry, M. Siponen, S. Pahnila, T. Vartiainen, and A. Vance, What levels of moral reasoning and values explain adherence to information security rules? An empirical study, European Journal of Information Systems, vol. 18, no. 2, pp , [38] A. C. Johnston, M. Warkentin, and M. Siponen, An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric, MIS Quarterly, vol. 39, no. 1, pp , [39] S. Taylor, and P. Todd, Assessing IT usage: The role of prior experience, MIS Quarterly, vol. 19, no. 4, pp , ASIA '15 5

5 [40] I. Ajzen, The theory of planned behavior, Organizational Behavior and Human Decision Processes, vol. 50, pp , [41] I. Ajzen, and M. Fishbein, The prediction of behavioral intentions in a choice situation, Journal of Experimental Social Psychology, vol. 5, pp , [42] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, User acceptance of information technology: Toward a unified view, MIS Quarterly, vol. 27, no. 3, pp , [43] S. Petter, W. DeLone, and E. R. McLean, Information systems success: The quest for the independent variables, Journal of Management Information Systems, vol. 29, no. 4, pp. 7-61, [44] M. Warkentin, A. C. Johnston, and J. Shropshire, The influence of the informal social learning environment on information privacy policy compliance efficacy and intention, European Journal of Information Systems, vol. 20, no. 3, pp , [45] K. Witte, Putting the fear back into fear appeals: The extended parallel process model, Communication Monographs, vol. 59, no , [46] J. Lu, J. E. Yao, and C.-S. Yu, Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology, Journal of Strategic Information Systems, vol. 14, pp , [47] A. C. Johnston, and M. Warkentin, Fear appeals and information security behaviors: An empirical study, MIS Quarterly, vol. 34, no. 3, pp. 549-A4, [48] Y. Lee, and K. R. Larsen, Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software, European Journal of Information Systems, vol. 18, no. 2, pp , [49] C. L. Anderson, and R. Agarwal, Practicing safe computing: A multimethod empirical examination of home computer user security behavior intentions, MIS Quarterly, vol. 34, no. 3, pp , [50] T. Herath, and H. R. Rao, Protection motivation and deterrence: A framework for security policy compliance in organisations, European Journal of Information Systems, vol. 18, no. 2, pp , [51] P. Ifinedo, Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol. 31, no. 1, pp , [52] S. Pahnila, M. Siponen, and A. Mahmood, "Employees behavior towards IS security policy compliance," in Proceedings of the 40th Annual Hawaii International Conference on System Sciences, 2007 IEEE. ASIA '15 6

Employee Compliance with Information Systems Security Policy in Retail Industry. Case: Store Level Employees

Employee Compliance with Information Systems Security Policy in Retail Industry. Case: Store Level Employees University of Massachusetts Boston ScholarWorks at UMass Boston Honors Thesis Program in the College of Management College of Management 5-1-2012 Employee Compliance with Information Systems Security Policy

More information

The Role of Situational Factors and Personality on Cybersecurity Policy Violation

The Role of Situational Factors and Personality on Cybersecurity Policy Violation September 2012 The Role of Situational Factors and Personality on Cybersecurity Policy Violation Project Leads Maranda McBride, PhD, North Carolina A&T State University Lemuria Carter, PhD, North Carolina

More information

THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1

THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1 THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1 Juhee Kwon Center for Digital Strategies Tuck School of Business Dartmouth College Hanover, NH 03755 [email protected]

More information

WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS

WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS RESEARCH ARTICLE WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS Scott R. Boss Department of Accountancy, Bentley University,

More information

Empirical Analysis of Leadership and Social Learning Effects on Employees' Information Security Behaviour. Masterarbeit

Empirical Analysis of Leadership and Social Learning Effects on Employees' Information Security Behaviour. Masterarbeit Empirical Analysis of Leadership and Social Learning Effects on Employees' Information Security Behaviour Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft

More information

Employees Information Security Awareness and Behavior: A Literature Review

Employees Information Security Awareness and Behavior: A Literature Review 2013 46th Hawaii International Conference on System Sciences Employees Information Security Awareness and Behavior: A Literature Review Benedikt Lebek, Jörg Uffen, Michael H. Breitner Leibniz Universität

More information

Cyber security in the workplace: Understanding and promoting behaviour change

Cyber security in the workplace: Understanding and promoting behaviour change Cyber security in the workplace: Understanding and promoting behaviour change John M Blythe PaCT Lab, Department of Psychology, Northumbria University, Newcastle-upon-Tyne, UK NE1 8ST [email protected]

More information

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS

More information

87. Which Factors Explain Employees Adherence to Information Security Policies? An Empirical Study

87. Which Factors Explain Employees Adherence to Information Security Policies? An Empirical Study 87. Which Factors Explain Employees Adherence to Information Security Policies? An Empirical Study Seppo Pahnila University of Oulu, Finland [email protected] Adam Mahmood University of Texas,USA [email protected]

More information

Influencing employees compliance behavior towards Information Security Policy

Influencing employees compliance behavior towards Information Security Policy Influencing employees compliance behavior towards Information Security Policy The Telesur case By Billey B. Best (Suriname) Supervised by: Prof. Vincent Feltkamp, PhD. This paper was submitted in partial

More information

Abstract. Keywords: Mobile commerce, short messaging services, mobile marketing. Mobile Marketing

Abstract. Keywords: Mobile commerce, short messaging services, mobile marketing. Mobile Marketing Consumer Perspectives On Mobile Advertising And Marketing Craig Standing, Steve Benson, Edith Cowan University Heikki Karjaluoto, University of Oulu, Finland Abstract Mobile marketing is set to make a

More information

SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION

SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION Pamela A. Dupin-Bryant, Utah State University, [email protected] ABSTRACT Software piracy,

More information

Perceived Business Process Knowledge, The Construct, Its Dimensions, and the Measurement

Perceived Business Process Knowledge, The Construct, Its Dimensions, and the Measurement Perceived Business Process Knowledge, The Construct, Its Dimensions, and the Measurement Jose O. Angeles, Trident University International Indira Guzman, Trident University International Sean Hansen, Rochester

More information

FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY 1

FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY 1 SPECIAL ISSUE FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY 1 By: Allen C. Johnston Department of Management, Information Systems, and Quantitative Methods School of Business University

More information

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong K. M. Sam 1, C. R. Chatwin 2, I. C. Ma 3 1 Department of Accounting and Information Management, University of Macau, Macau, China

More information

Research Article An Integrative Behavioral Model of Information Security Policy Compliance

Research Article An Integrative Behavioral Model of Information Security Policy Compliance e Scientific World Journal, Article ID 463870, 12 pages http://dx.doi.org/10.1155/2014/463870 Research Article An Integrative Behavioral Model of Information Security Policy Compliance Sang Hoon Kim, 1

More information

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University [email protected]

More information

Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior

Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior Journal: International Conference on Information Systems 2013 Manuscript ID: ICIS-1149-2013.R1 Track:

More information

UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS

UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS Journal of Electronic Commerce Research, VOL 14, NO 2, 2013 UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS Yongqiang Sun School of Information

More information

The Human Factor of Cyber Crime and Cyber Security

The Human Factor of Cyber Crime and Cyber Security The Human Factor of Cyber Crime and Cyber Security Challenges: September 11th has marked an important turning point that exposed new types of security threats and disclosed how cyber criminals pursuit

More information

A STUDY ON ERP SYSTEM ACCEPTANCE BASED ON TECHNOLOGY ACCEPTANCE MODEL

A STUDY ON ERP SYSTEM ACCEPTANCE BASED ON TECHNOLOGY ACCEPTANCE MODEL A STUDY ON SYSTEM ACCEPTANCE BASED ON TECHNOLOGY ACCEPTANCE MODEL Rajesri Govindaraju and Nenny Indriany Faculty of Industrial Technology, Bandung Institute of Technology Jalan Ganesha No. 10, Bandung

More information

Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies

Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies September 2012 Authors Maranda McBride, PhD, rth Carolina A&T State University

More information

Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia

Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia International Review of Business Research Papers Vol.4 No.5. October-November 2008. PP.1-10 Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In

More information

Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data

Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data Robert E. Crossler The University of Texas Pan American [email protected] Abstract This study uses Protection Motivation

More information

PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST?

PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST? PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST? Shanan G. Gibson & Elaine D. Seeman College of Business, East Carolina University [email protected]; [email protected] ABSTRACT

More information

INFLUENCE OF SECURITY COMPLIANCE DEMANDS AND RESOURCES ON SECURITY COMPLIANCE-AN EXPLORATORY STUDY IN VIETNAM

INFLUENCE OF SECURITY COMPLIANCE DEMANDS AND RESOURCES ON SECURITY COMPLIANCE-AN EXPLORATORY STUDY IN VIETNAM INFLUENCE OF SECURITY COMPLIANCE DEMANDS AND RESOURCES ON SECURITY COMPLIANCE-AN EXPLORATORY STUDY IN VIETNAM Cong Hiep Pham, School of Business Information Technology and Logistics, RMIT University Vietnam,

More information

MASTER'S THESIS. Mitigating Data Leakage by Enforcing the Information System Security Policy. Rune Millerjord Oscar Sundström 2015

MASTER'S THESIS. Mitigating Data Leakage by Enforcing the Information System Security Policy. Rune Millerjord Oscar Sundström 2015 MASTER'S THESIS Mitigating Data Leakage by Enforcing the Information System Security Policy Rune Millerjord Oscar Sundström 2015 Master (120 credits) Master of Science in Information Security Luleå University

More information

Students Acceptance on Document Sharing through Online Storage System

Students Acceptance on Document Sharing through Online Storage System Students Acceptance on Document Sharing through Online Storage System Wan Hussain Wan Ishak, Fadhilah Mat Yamin, Amlus Ibrahim Universiti Utara Malaysia, Sintok, Kedah, Malaysia Email: [email protected]

More information

SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY

SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY AND TRAINING ADHERENCE Mark A. Harris University of South Carolina [email protected] ABSTRACT Information security policy and information security

More information

A Case Study of CRM Adoption in Higher Education

A Case Study of CRM Adoption in Higher Education A Case Study of CRM Adoption in Higher Education Chitra Nair, Susy Chan, Xiaowen Fang DePaul University School of Computer Science Chicago, IL [email protected],[email protected], [email protected]

More information

Issues in Information Systems Volume 13, Issue 1, pp. 258-263, 2012

Issues in Information Systems Volume 13, Issue 1, pp. 258-263, 2012 FACULTY PERCEPTIONS OF PEDAGOGICAL BENEFITS OF WEB 2.0 TECHNOLOGIES AND VARIABLES RELATED TO ADOPTION Pamela A. Dupin-Bryant, Utah State University, [email protected] 258 ABSTRACT In recent years,

More information

THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION

THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION Elaine Seeman, Department of Management Information Systems College of Business, East Carolina

More information

How To Know If An Employee Will Comply With Bring Your Own Device Security Policy

How To Know If An Employee Will Comply With Bring Your Own Device Security Policy Employees Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory Abstract Complete Research Putri, Frida, Korea University, Seoul, South

More information

Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.6, No.4, 2015

Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.6, No.4, 2015 A Review of Impacts of Bring Your Own Device (BYOD) and Nomadic Computing on Enterprise Security Policies Compliance: The Case of Higher Learning Institutions in Kenya Peter Namisiko 1* Dr. William Sakataka

More information

UNDERSTANDING EXPLORATORY USE

UNDERSTANDING EXPLORATORY USE UNDERSTANDING EXPLORATORY USE OF ERP SYSTEMS 1 Rui D. Sousa Terry College of Business University of Georgia [email protected] Dale L. Goodhue Terry College of Business University of Georgia [email protected]

More information

Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness

Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness Norshima Humaidi and Vimala Balakrishnan Abstract Leadership styles play an important

More information

Business Case. for an. Information Security Awareness Program

Business Case. for an. Information Security Awareness Program Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security

More information

UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES

UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES Cynthia M. Jones, Nova Southeastern University, [email protected] Richard V. McCarthy,

More information

INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK

INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK Richard V. McCarthy, Quinnipiac University, [email protected] Leila Halawi, Nova Southeastern University, [email protected] Jay E. Aronson,

More information

Task-Technology Fit and Adoption Behaviors of Mobile Business Systems

Task-Technology Fit and Adoption Behaviors of Mobile Business Systems International DSI / Asia and Pacific DSI 2007 Full Paper (July, 2007) Task-Technology Fit and Adoption Behaviors of Mobile Business Systems Ching-Chang Lee *, Kuo-Wei Su, Cheng-Ta Lu, Xin-Xin Yu National

More information

Investigation of Stakeholders Commitment to Information Security Awareness Programs

Investigation of Stakeholders Commitment to Information Security Awareness Programs 2008 International Conference on Information Security and Assurance Investigation of Stakeholders Commitment to Information Security Awareness Programs Jemal H. Abawajy, K. Thatcher and Tai-hoon Kim School

More information

Theories of Behavior Change

Theories of Behavior Change Theories of Behavior Change Defining Theories of Behavior Change Behavior change is often a goal for staff working directly with constituents, organizations, governments, or communities. Individuals charged

More information

Jurnal Teknologi CONTINUOUS USE OF ONLINE STORAGE SYSTEM FOR DOCUMENT SHARING. Full Paper. Fadhilah Mat Yamin a*, Wan Hussain Wan Ishak b

Jurnal Teknologi CONTINUOUS USE OF ONLINE STORAGE SYSTEM FOR DOCUMENT SHARING. Full Paper. Fadhilah Mat Yamin a*, Wan Hussain Wan Ishak b Jurnal Teknologi CONTINUOUS USE OF ONLINE STORAGE SYSTEM FOR DOCUMENT SHARING Fadhilah Mat Yamin a*, Wan Hussain Wan Ishak b a School of Technology Management & Logistics, College of Business, Universiti

More information

Kimmo Rantonen EXPLAINING INFORMATION SECURITY BEHAVIOR CASE OF THE HOME USER

Kimmo Rantonen EXPLAINING INFORMATION SECURITY BEHAVIOR CASE OF THE HOME USER Kimmo Rantonen EXPLAINING INFORMATION SECURITY BEHAVIOR CASE OF THE HOME USER JYVÄSKYLÄN YLIOPISTO TIETOJENKÄSITTELYTIETEIDEN LAITOS 2014 TIIVISTELMÄ Rantonen, Kimmo Kotikäyttäjien tietoturvakäyttäytyminen

More information

STUDYING COMPUTER SECURITY IN A MIS DEGREE PROGRAM

STUDYING COMPUTER SECURITY IN A MIS DEGREE PROGRAM STUDYING COMPUTER SECURITY IN A MIS DEGREE PROGRAM Qinyu Liao The University of Texas at Brownsville and Texas Southmost College 80 Fort Brown Brownsville,TX 78521 [email protected] 956-883-5825

More information

UK s new Research Institute investigates the science of cybersecurity

UK s new Research Institute investigates the science of cybersecurity UK s new Research Institute investigates the science of cybersecurity Government Communications Headquarters (GCHQ) How do we know when we are secure enough? How do we decide how best to spend our precious

More information

An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software

An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software Jack T. Marchewka Chang Liu Operations Management and Information Systems Department Northern Illinois

More information

http://jist.irandoc.ac.ir *[email protected] 1. [email protected] 2. Theory Planned Behavior (TPB) TPB

http://jist.irandoc.ac.ir *adelsulaimany@gmail.com 1. zarafshani2000@yahoo.com 2. Theory Planned Behavior (TPB) TPB * 1 1389/06/ 29 : 1389/05/05 : 2 251-8 223 ( ) 2 251-8 231 ( ) ISC SCOPUS L ISA http://jist.irandoc.ac.ir 343-325 2 27 1390 : *[email protected] 1. [email protected] 2. Theory Planned Behavior

More information

PHYSICIANS ACCEPTANCE OF WEB-BASED MEDICAL ASSESSMENT SYSTEMS: FINDINGS FROM A NATIONAL SURVEY

PHYSICIANS ACCEPTANCE OF WEB-BASED MEDICAL ASSESSMENT SYSTEMS: FINDINGS FROM A NATIONAL SURVEY PHYSICIANS ACCEPTANCE OF WEB-BASED MEDICAL ASSESSMENT SYSTEMS: FINDINGS FROM A NATIONAL SURVEY Bengisu Tulu School of Information Science Claremont Graduate University [email protected] Brian Hilton

More information

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT 1 E-learning: Students perceptions of online learning in hospitality programs Sungmi Song Hospitality Management Iowa State University Robert Bosselman Hospitality Management Iowa State University ABSTRACT

More information

Issues in Information Systems Volume 14, Issue 2, pp.139-148, 2013

Issues in Information Systems Volume 14, Issue 2, pp.139-148, 2013 COLLEGE STUDENT HOME COMPUTER SECURITY ADOPTION Chet L. Claar, Central Washington University, [email protected] Robert C. Shields, Central Washington University, [email protected] David Rawlinson, Central Washington

More information

Measures for improving information security management in organisations: the impact of training and awareness programmes

Measures for improving information security management in organisations: the impact of training and awareness programmes Measures for improving information security management in organisations: the impact of training and awareness programmes Nesren Waly, Rana Tassabehji and Mumtaz Kamala School of Computing, Informatics

More information

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against

More information

Measuring Employees Information Security Compliance Behaviors:

Measuring Employees Information Security Compliance Behaviors: Measuring Employees Information Security Compliance Behaviors: A Holistic State Perspective 1 Xiaolong Wang, 2 Wenli Li 1, First Author Faculty of Management and Economics, Dalian University of Technology,

More information

EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT

EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT Matthew J. Wills, Dakota State University Omar F. El-Gayar, Dakota State University Dorine Bennett, Dakota State

More information

ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS

ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS Siti Rahayu Abdul Aziz 1, Mohamad Ibrahim 2, and Suhaimi Sauti 3 1 Universiti Teknologi MARA, Malaysia, [email protected]

More information

Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18

Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Fida Hussain Chandio [email protected] ABSTRACT Pakistan banking sector has gone through

More information

Employees Behavior towar ds IS Secur ity Policy Compliance

Employees Behavior towar ds IS Secur ity Policy Compliance Proceedings of the 4th Hawaii International Conference on System Sciences - 27 Employees Behavior towar ds IS Secur ity Policy Compliance Seppo Pahnila a, Mikko Siponen a and Adam Mahmood b a University

More information

DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN

DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN INTRODUCTION Fauziah Baharom 1, Ola T. Khorma 2, Haslina Mohd 3, and Mahmood G. Bashayreh

More information

TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS FOR ENGINEERING SMEs IN EMERGING ECONOMIES

TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS FOR ENGINEERING SMEs IN EMERGING ECONOMIES TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS FOR ENGINEERING SMEs IN EMERGING ECONOMIES by Tapiwa Gundu Towards an Information Security Awareness Process for Engineering SMEs in Emerging Economies.

More information

Customers Acceptance of Online Shopping In Saudi Arabia

Customers Acceptance of Online Shopping In Saudi Arabia Customers Acceptance of Online Shopping In Saudi Arabia Sulaiman A. Al-Hudhaif, Ph.D. Saleh Saad Alqahtani, Ph.D. College of Business Administration King Saud University Introduction: Good news for e-

More information

THE ONLINE CONSUMER TRUST CONSTRUCT: A WEB MERCHANT PRACTITIONER PERSPECTIVE

THE ONLINE CONSUMER TRUST CONSTRUCT: A WEB MERCHANT PRACTITIONER PERSPECTIVE THE ONLINE CONSUMER TRUST CONSTRUCT: A WEB MERCHANT PRACTITIONER PERSPECTIVE Allen C. Johnston Mississippi State University [email protected] Merrill Warkentin Mississippi State University [email protected]

More information

STUDENTS PERCEPTIONS OF IT SUPPORTED LEARNING

STUDENTS PERCEPTIONS OF IT SUPPORTED LEARNING Bilgi Ekonomisi ve Yönetimi Dergisi / 2011 Cilt: VI Sayı: II STUDENTS PERCEPTIO OF IT SUPPORTED LEARNING Meliha HANDZIC * Merdžana OBRALIC ** Emir CICKUSIC *** Abstract: The objective of this study was

More information

PROPOSED DOCTORATE RESEARCH

PROPOSED DOCTORATE RESEARCH PROPOSED DOCTORATE RESEARCH Socialization Tactics and Newcomer Adjustment: The Role of Organizational Culture, Team Dynamics, and Personality Dimensions PURPOSE Socialization Tactics and Newcomer Adjustment:

More information

Maximising the Effectiveness of Information Security Awareness

Maximising the Effectiveness of Information Security Awareness Maximising the Effectiveness of Information Security Awareness This thesis offers a fresh look at information security awareness using research from marketing and psychology. By Geordie Stewart and John

More information

DIMENSIONS OF E-LEARNING EFFECTIVENESS - A THEORETICAL PERSPECTIVE

DIMENSIONS OF E-LEARNING EFFECTIVENESS - A THEORETICAL PERSPECTIVE IJER Serials Publications 12(2), 2015: 411-416 ISSN: 0972-9380 DIMENSIONS OF E-LEARNING EFFECTIVENESS - A THEORETICAL PERSPECTIVE Abstract: Corporates and educational institutions are increasing adopting

More information

Influence of Personality on Teen Texting While Driving Perceptions

Influence of Personality on Teen Texting While Driving Perceptions Influence of Personality on Teen Texting While Driving Perceptions Lemuria Carter Maranda McBride North Carolina A&T State University Presentation Overview Introduction Background Literature Research Model

More information

Assessment of Cybersecurity Knowledge and Behavior: An Anti-phishing Scenario

Assessment of Cybersecurity Knowledge and Behavior: An Anti-phishing Scenario Assessment of Cybersecurity Knowledge and Behavior: An Anti-phishing Scenario Ping An Wang Department of Cybersecurity and Information Assurance, Graduate School University of Maryland University College

More information

An Instrument to Assess Organizational Readiness to Implement Knowledge Management Process

An Instrument to Assess Organizational Readiness to Implement Knowledge Management Process An Instrument to Assess Organizational Readiness to Implement Knowledge Management Process Mohamed Jalaldeen Mohamed Razi, Nor Shahriza Abdul Karim Department of Information Systems Kulliyyah of Information

More information

Factors Influencing Audit Technology Acceptance by Audit Firms: A New I-TOE Adoption Framework

Factors Influencing Audit Technology Acceptance by Audit Firms: A New I-TOE Adoption Framework IBIMA Publishing Journal of Accounting and Auditing: Research & Practice http://www.ibimapublishing.com/journals/jaarp/jaarp.html Vol. 2012 (2012), Article ID 876814, 11 pages DOI: 10.5171/2012.876814

More information

Adoption of tax e-filing: A conceptual paper

Adoption of tax e-filing: A conceptual paper African Journal of Business Management Vol. 4(5), pp. 599-603, May 2010 Available online at http://www.academicjournals.org/ajbm ISSN 1993-8233 2010 Academic Journals Full Length Research Paper Adoption

More information

Targeted Advertising and Consumer Privacy Concerns Experimental Studies in an Internet Context

Targeted Advertising and Consumer Privacy Concerns Experimental Studies in an Internet Context TECHNISCHE UNIVERSITAT MUNCHEN Lehrstuhl fur Betriebswirtschaftslehre - Dienstleistungsund Technologiemarketing Targeted Advertising and Consumer Privacy Concerns Experimental Studies in an Internet Context

More information