Cyber-security, Privacy and Ethics of IS

Loading...

Media is loading
 

Paper Number

1514

Paper Type

Completed

Description

Many contemporary organizations pit on information security policy compliance to combat information security threats originating from their own workforce. However, recent findings suggest that employees’ adherence to security rules and regulations alone is insufficient to protect organizational assets. Instead, extra-role security behavior – actions that go beyond what is specified in policies and are beneficial to the firms – is needed. So far, research with regard to extra-role security behavior is meager, in particular concerning contextual determinants influencing whether employees exhibit prosocial behaviors or not. Hence, this paper uses predictive modeling, or more precisely supervised machine learning, to classify employees according to their likelihood of exhibiting extra-role security behaviors. Results indicate that informational, social, and task context factors significantly impact the performance of extra-role security behavior.

Comments

07-Security

Share

COinS
 
Dec 12th, 12:00 AM

Using Machine Learning Techniques to Explore Extra-Role Security Behavior

Many contemporary organizations pit on information security policy compliance to combat information security threats originating from their own workforce. However, recent findings suggest that employees’ adherence to security rules and regulations alone is insufficient to protect organizational assets. Instead, extra-role security behavior – actions that go beyond what is specified in policies and are beneficial to the firms – is needed. So far, research with regard to extra-role security behavior is meager, in particular concerning contextual determinants influencing whether employees exhibit prosocial behaviors or not. Hence, this paper uses predictive modeling, or more precisely supervised machine learning, to classify employees according to their likelihood of exhibiting extra-role security behaviors. Results indicate that informational, social, and task context factors significantly impact the performance of extra-role security behavior.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.