17
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Acquiring Subject Participation for Information Security Survey Research: A Content and Correspondence Analysis Approach

Pages 3-30 | Published online: 07 Jul 2014
 

Abstract

Twenty-four business executives and 22 security executives had previously participated in a study about information security investment. The current study asked participants to comment on their reasons for participating in that research. A total of 1003 reasons were submitted which were used to perform a content analysis of information security survey research (ISSR) participation factors. Security and business executives' reasons for participating differed. Reasons also differed by industry. The findings will help researchers to properly communicate the benefits of their studies and thus increase participation rates for ISSR. Greater participation will perhaps contribute to efforts to improve information security.

Additional information

Notes on contributors

Alice M. Johnson

Dr. Alice M. Johnson is an associate professor in the School of Business and Economics at North Carolina Agricultural and Technical State University. She holds a B.A. in Business Administration from Winston-Salem State University, an M.S. in Personnel and Industrial Relations from Winthrop University, and a Ph.D. in Decision Sciences and Information Systems from the Gatton College of Business and Economics at the University of Kentucky. She is a Certified Information Systems Auditor (CISA). Her research has previously appeared in the Journal of Management Information Systems, Information & Management, the Journal of Information Privacy and Security, and elsewhere.

Belinda P. Shipps

Dr. Belinda P. Shipps is an assistant professor in the School of Business and Economics at North Carolina Agricultural and Technical State University. She holds a B.A. in Education from Michigan State University, an M.S. in Management Information Systems from the University of Wisconsin-Milwaukee, and a Ph.D. in Management Information Systems from the Lubar School of Business at the University of Wisconsin-Milwaukee. Her research interests include: IT security, sourcing/staffing issues and strategies, social networking and education.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.