Loading...
Paper Type
Complete
Description
Several studies have identified employees within organizations as the weakest link in information security. Although many measures are in place to stimulate employee interest in cyber security, the challenge seems not always at the organizational level but sometimes at the employee behavioral level. In this study, we develop a construct named stakes consciousness to provide a better understanding of employee information security awareness within organizations. We focus on employees' origins and environments to explain their risk averseness and understand their information security awareness. We use the characteristics of organizations, such as the firm sector, sector density, and network centrality, to explain the importance of employees' information security awareness. Finally, we provide an overview of the application of this construct in technological, organizational, and individual contexts.
Paper Number
1784
Recommended Citation
Kouyo, Guy Alain Sylvanus; Nishant, Rohit; and Khechine, Hager, "Using stakes consciousness to better understand information security awareness" (2023). AMCIS 2023 Proceedings. 26.
https://aisel.aisnet.org/amcis2023/sig_sec/sig_sec/26
Using stakes consciousness to better understand information security awareness
Several studies have identified employees within organizations as the weakest link in information security. Although many measures are in place to stimulate employee interest in cyber security, the challenge seems not always at the organizational level but sometimes at the employee behavioral level. In this study, we develop a construct named stakes consciousness to provide a better understanding of employee information security awareness within organizations. We focus on employees' origins and environments to explain their risk averseness and understand their information security awareness. We use the characteristics of organizations, such as the firm sector, sector density, and network centrality, to explain the importance of employees' information security awareness. Finally, we provide an overview of the application of this construct in technological, organizational, and individual contexts.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.
Comments
SIG SEC