Start Date

16-8-2018 12:00 AM

Description

Mitigating Information Security (IS) violations is crucial since organizations relying more on their information systems. This cannot be achieved only by advancements in security software and hardware technologies, but also there is a need to have multi-perspective approaches toward security violation prevention in organizations. Thus, we apply Crime Prevention through Environmental Design (CPTED) approach to develop conceptual research model in the context of IS. Our model considers both technical and non-technical perspectives as well as covers human-related, managerial and physical aspects of IS management. Moreover, we propose the moderation roles of two personality traits (trait anxiety and negative affectivity) on the relationships between all five variables of the research model and IS violation because impacts of personality is an inseparable part of human behaviors. To our best knowledge, this is the first study that applied CPTED into IS domain. This may help to reduce security violation in the organization.

Share

COinS
 
Aug 16th, 12:00 AM

Security Violation Prevention; CPTED in the context of information Security

Mitigating Information Security (IS) violations is crucial since organizations relying more on their information systems. This cannot be achieved only by advancements in security software and hardware technologies, but also there is a need to have multi-perspective approaches toward security violation prevention in organizations. Thus, we apply Crime Prevention through Environmental Design (CPTED) approach to develop conceptual research model in the context of IS. Our model considers both technical and non-technical perspectives as well as covers human-related, managerial and physical aspects of IS management. Moreover, we propose the moderation roles of two personality traits (trait anxiety and negative affectivity) on the relationships between all five variables of the research model and IS violation because impacts of personality is an inseparable part of human behaviors. To our best knowledge, this is the first study that applied CPTED into IS domain. This may help to reduce security violation in the organization.