Loading...

Media is loading
 

Paper Type

Complete

Abstract

Employees’ security behaviors are essential to organizational information security posture. Unfortunately, employee disinterest in security risks and risk-mitigating behaviors remains a persistent challenge. In response, scholars have turned attention to intrinsic motivational drivers of employees’ security behaviors. Within this stream, security role identity is highlighted as a powerful influence on secure behavior enactment; however, we currently understand very little about how to effectively manipulate it. In an effort to inform strategies for hardening the ‘human firewall’ through activation of employees’ security role identities, this research examines security behavior enactment through a distinct role-focused, social information processing lens. Grounded in identity theory and self-efficacy theory of motivation, this study highlights two important sources of social information—supervisor embodiment of organizational information security values and IS department security-related support—which promote security role activation (as captured via security behavior enactment) through attenuation of security role-related strain and enhancement of security role-related efficacy.

Paper Number

1244

Author Connect URL

https://authorconnect.aisnet.org/conferences/AMCIS2024/papers/1244

Comments

SIGSEC

Author Connect Link

Share

COinS
Best Paper Nominee badge
Top 25 Paper Badge
 
Aug 16th, 12:00 AM

Hardening the ‘Human Firewall’ Through Security Role Identity Activation: A Social Information Processing Perspective

Employees’ security behaviors are essential to organizational information security posture. Unfortunately, employee disinterest in security risks and risk-mitigating behaviors remains a persistent challenge. In response, scholars have turned attention to intrinsic motivational drivers of employees’ security behaviors. Within this stream, security role identity is highlighted as a powerful influence on secure behavior enactment; however, we currently understand very little about how to effectively manipulate it. In an effort to inform strategies for hardening the ‘human firewall’ through activation of employees’ security role identities, this research examines security behavior enactment through a distinct role-focused, social information processing lens. Grounded in identity theory and self-efficacy theory of motivation, this study highlights two important sources of social information—supervisor embodiment of organizational information security values and IS department security-related support—which promote security role activation (as captured via security behavior enactment) through attenuation of security role-related strain and enhancement of security role-related efficacy.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.