Browse > Article
http://dx.doi.org/10.14400/JDC.2021.19.8.049

Analysis of the effects of self-control and organization-control on information security attitude  

Hu, Sung-ho (Department of Psychology, Chung-Ang University)
Hwang, In-ho (College of General Education, Kookmin University)
Publication Information
Journal of Digital Convergence / v.19, no.8, 2021 , pp. 49-57 More about this Journal
Abstract
This paper aims to confirm the effect of self-control and organization-control on information security attitude. The research method is composed of a cross-design of locus of control and tightness culture. The measurement variables used in the assessment are information security actual attitude, compliace behavioral attitude, and information security efficacy. As a result, the locus of control had a significant effect on information security actual attitude, information security efficacy, information security efficacy, and it was found that influence of the internal-based condition was greater than the external-based condition. The tightness culture had a significant effect on compliace behavioral attitude, information security efficacy, and it was found that influence of the tight culture-based condition was greater than the loose culture-based condition. In addition, the discussion contatins the implications of information security direction that reflect these research results.
Keywords
locus of control; tightness culture; information security actual attitude; compliace behavioral attitude; information security efficacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. V. Research. (2019). Home Textiles Market Size, Share & Trends Analysis Report by Product (Carpets & Floor Covering, Bathroom Linen, Bedroom Linen), By Region, By Distribution Channel (Retail Outlet, Online), And Segment Forecasts, 2019 - 2025. https://www.globenewswire.com
2 R. W. Lee, I. H. Hwang & S. H. Hu. (2017). Exploratory research of information security strategy focused on human factors. The Journal of General Education, 6, 103-124.   DOI
3 J. D'Arcy & P.-L. Teh. (2019). Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization. Information & Management, 56(7), 103151. DOI : 10.1016/j.im.2019.02.006   DOI
4 Verizon. (2020). 2020 data breach investigations report. Richmod, Texas.
5 I. Corradini, (2020). Security: Human Nature and Behaviour. Springer.
6 M. L. Foulds. (1971). Changes in locus of internal-external control: A growth group experience. Comparative Group Studies, 2(3), 293-300. DOI : 10.1177/104649647100200303   DOI
7 S. A. Stumpf & M. London. (1981). Management promotions: Individual and organizational factors influencing the decision process. Academy of Management Review, 6(4), 539-549.   DOI
8 S. H. Schwartz. (1990). Individualism-collectivism: Critique and proposed refinements. Journal of cross-cultural psychology, 21(2), 139-157.   DOI
9 L. Tredinnick. (2008). Digital information culture: the individual and society in the digital age. Amsterdam : Elsevier.
10 M. J. Gelfand, L. H. Nishii & J. L. Raver. (2006). On the nature and importance of cultural tightness-looseness. Journal of Applied Psychology, 91(6), 1225-1244. DOI : 10.1037/0021-9010.91.6.1225   DOI
11 M. Siponen, M. A. Mahmood & S. Pahnila. (2014). Employees' adherence to information security policies: An exploratory field study. Information & Management, 51(2), 217-224.   DOI
12 E. Hartono, C. W. Holsapple, K.-Y. Kim, K.-S. Na & J. T. Simpson. (2014). Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems, 62, 11-21.   DOI
13 T. Herath & H. R. Rao. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.   DOI
14 P. Ifinedo. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. DOI : 10.1016/j.cose.2011.10.007   DOI
15 P. Ifinedo. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79. DOI : 10.1016/j.im.2013.10.001   DOI
16 N. S. Safa, M. Sookhak, R. Von Solms, S. Furnell, N. A. Ghani & T. Herawan. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78. DOI : 10.1016/j.cose.2015.05.012   DOI
17 J. Kaur & N. Mustafa, (2013). Examining the effects of knowledge, attitude and behaviour on information security awareness: A case on SME. IEEE.
18 I. H. Hwang & S. H. Hu. (2018). A Study on the Influence of Information Security Compliance Intention of Employee: Theory of Planned Behavior, Justice Theory, and Motivation Theory Applied. Journal of Digital Convergence, 16(3), 225-236. DOI : 10.14400/JDC.2018.16.3.225   DOI
19 S. J. Lee & H. Lina Kim. (2018). Roles of perceived behavioral control and self-efficacy to volunteer tourists' intended participation via theory of planned behavior. International Journal of Tourism Research, 20(2), 182-190. DOI : 10.1002/jtr.2171   DOI
20 B. Khan, K. S. Alghathbar, S. I. Nabi & M. K. Khan. (2011). Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management, 5(26), 10862-10868. DOI : 10.5897/AJBM11.067
21 M. Chan, I. Woon & A. Kankanhalli. (2005). Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of information privacy and security, 1(3), 18-41.   DOI
22 I. H. Hwang & S. H. Hu. (2021). A Study on the Information Security Related Organizational Citizenship Behavior : From Prospect Theory and Goal Orientation Theory Perspective. Journal of Digital Convergence, 19(1), 89-97.   DOI