Paper Type

ERF

Description

Employees play a vital role in an organization’s information security posture. Most security breaches involve human elements such as stolen credentials, phishing scams, misuse, or simple errors from employees. As the threat landscape continues to put pressure on this aspect of organizational information security, there is an increasing need to effectively motivate employees towards desirable security attitudes and outcomes. Social influence has been found to help shape employees’ information security attitudes. However, there is limited understanding of the roles different motivational processes can play in this context – which may have differential effect of employee attitudes towards security. In this study we use Kelman’s social influence theory which proposes that an individual’s attitudes are influenced by referent others through three processes - compliance, identification, and internalization. The study aims to provide valuable insights for researchers and practitioners alike.

Paper Number

1893

Comments

Conference Theme

Share

COinS
 
Aug 10th, 12:00 AM

Shaping the attitude towards information security- a social influence approach

Employees play a vital role in an organization’s information security posture. Most security breaches involve human elements such as stolen credentials, phishing scams, misuse, or simple errors from employees. As the threat landscape continues to put pressure on this aspect of organizational information security, there is an increasing need to effectively motivate employees towards desirable security attitudes and outcomes. Social influence has been found to help shape employees’ information security attitudes. However, there is limited understanding of the roles different motivational processes can play in this context – which may have differential effect of employee attitudes towards security. In this study we use Kelman’s social influence theory which proposes that an individual’s attitudes are influenced by referent others through three processes - compliance, identification, and internalization. The study aims to provide valuable insights for researchers and practitioners alike.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.