Font Size: a A A

Information Security Systems Policy Violation: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence

Posted on:2016-06-18Degree:D.C.SType:Dissertation
University:Colorado Technical UniversityCandidate:Nsoh, Michael WarahFull Text:PDF
GTID:1478390017473696Subject:Computer Science
Abstract/Summary:
Information Systems Technology is core to strategic business processes in the current digital age; it is also a potential resource for competitive advantage for business organizations that want to take and maintain the lead in their market industry. The automating power of Information Technology has greatly increased return on investment and diminished turnaround time for most businesses around the world. Information Technology has enhanced experiences in the global economy. Besides its positive impact in facilitating business operations, it has had a tremendous impact in facilitating people's ordinary daily activities resulting in its increased used and reliance. Despite all the advantages that come with the adoption of Information Technology to accomplish critical business operations, there are also some serious damaging challenges that must constantly be assessed and properly addressed in order to maintain its reliable use. These challenges are what extant Information Technology literatures have always classified as information technology threats. Information Technology threats exist in several different forms and can be prevented using three basic approaches including: Technology, Administrative Procedures and Programs. The focus of this study has been on administrative procedures and using programs as an effective countermeasure techniques against Information Systems threats. The rationale for the effectiveness of these two countermeasure techniques is that, researchers and practitioners alike have always faced top challenges in transforming the behavior of internal users of Information Technology whom they have always considered as the weakest link of defense.;This study is built on recent empirical research in Information Systems Security Policy compliance from a behavioral standpoint. A composite theoretical framework was established that captures key factors known to possibly impact employee behavioral intention to comply with Information Security policies. The model that was established during this study used the Theory of Planed Behavior to test the impact of management interpersonal relationship on deterrence. Results indicate that, management has a stake and can significantly influence employee behavioral intent to comply with their organization's information systems security policy through involvement in the security enhancement process. A potential gap in the literature that this study was designed to cover is the impact of employee disgruntlement in modern business organizations' Information Systems Security endeavor. Results indicate that, even though considered by several empirical studies as potentially dangerous, employee disgruntlement is not top of the concerns about Information Systems Security Threats.
Keywords/Search Tags:Information, Systems, Security, Employee, Technology, Impact, Interpersonal relationship, Behavioral
Related items