406
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Behavioural threshold analysis: methodological and practical considerations for applications in information security

ORCID Icon &
Pages 1088-1106 | Received 18 May 2018, Accepted 24 Dec 2018, Published online: 21 Jan 2019

References

  • Ajzen, I. 1991. “The Theory of Planned Behavior.” Organizational Behavior and Human Decision Processes 50 (2): 179–211.
  • Al-Omari, A., O. El-Gayar, and A. Deokar. 2012. “Information Security Policy Compliance: The Role of Information Security Awareness.” In Proceedings of the 18th Americas Conference on Information Systems (Paper 16), 1–10. Seattle, WA: Association for Information Systems.
  • Ashenden, D. 2008. “Information Security Management: A Human Challenge?” Information Security Technical Report 13 (4): 195–201.
  • Bolarinwa, O. A. 2015. “Principles and Methods of Validity and Reliability Testing of Questionnaires Used in Social and Health Science Researches.” Nigerian Postgraduate Medical Journal 22 (4): 195–201.
  • Butler, R., and M. Butler. 2018. “Some Password Users are More Equal than Others: Towards Customisation of Online Security Initiatives.” South African Journal of Information Management 20 (1): 1–10.
  • Connolly, L., M. Lang, J. Gathegi, and J. D. Tygar. 2016. “The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study.” In Proceedings of the 10th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), 33–44. Frankfurt, Germany: Plymouth University.
  • Crowne, D. P., and D. Marlowe. 1964. The Approval Motive. New York: Wiley.
  • Cuganesan, S., C. Steele, and A. Hart. 2018. “How Senior Management and Workplace Norms Influence Information Security Attitudes and Self-Efficacy.” Behaviour & Information Technology 37 (1): 50–65.
  • Dahlgren, G. H., and H. Hansen. 2015. “I’d Rather be Nice than Honest: An Experimental Examination of Social Desirability Bias in Tourism Surveys.” Journal of Vacation Marketing 21 (4): 318–325.
  • Da Veiga, A., and N. Martins. 2017. “Defining and Identifying Dominant Information Security Cultures and Subcultures.” Computers & Security 70: 72–94.
  • Dhillon, G., R. Syed, and C. Pedron. 2016. “Interpreting Information Security Culture: An Organizational Transformation Case Study.” Computers & Security 56 (1): 63–69.
  • Dodou, D., and J. C. De Winter. 2014. “Social Desirability is the Same in Offline, Online, and Paper Surveys: A Meta-Analysis.” Computers in Human Behavior 36: 487–495.
  • Fazio, R. H. 1990. “Multiple Processes by Which Attitudes Guide Behavior: The MODE Model as an Integrative Framework.” Advances in Experimental Social Psychology 23 (1): 75–109.
  • Fisher, R. J. 1993. “Social Desirability Bias and the Validity of Indirect Questioning.” Journal of Consumer Research 20 (2): 303–315.
  • Granovetter, M. 1978. “Threshold Models of Collective Behavior.” American Journal of Sociology 83 (6): 1420–1443.
  • Growney, J. S. 1983. I Will if You Will: Individual Thresholds and Group Behavior - Applications of Algebra to Group Behavior. Bedford, MA: COMAP Inc.
  • Helfinstein, S. M., J. A. Mumford, and R. A. Poldrack. 2015. “If all Your Friends Jumped Off a Bridge: The Effect of Others’ Actions on Engagement in and Recommendation of Risky Behaviors.” Journal of Experimental Psychology: General 144 (1): 12–17.
  • Ifinedo, P. 2012. “Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory.” Computers & Security 31 (1): 83–95.
  • Kaur, J., and N. Mustafa. 2013. “Examining the Effects of Knowledge, Attitude and Behaviour on Information Security Awareness: A Case on SME.” In Proceedings of the 2013 International Conference on Research and Innovation in Information Systems (ICRIIS), 286–290. Kuala Lumpur, Malaysia: IEEE.
  • Kruger, H. A., and W. D. Kearney. 2006. “A Prototype for Assessing Information Security Awareness.” Computers & Security 25 (4): 289–296.
  • Nguyen, Q. N., and D. J. Kim. 2017. “Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives.” In Proceedings of the 50th Hawaii International Conference on System Sciences, 4947–4956. Hawaii: University of Hawaii at Manoa.
  • Parsons, K., D. Calic, M. Pattinson, M. Butavicius, A. McCormac, and T. Zwaans. 2017. “The Human Aspects of Information Security Questionnaire (HAIS-Q): Two Further Validation Studies.” Computers & Security 66 (2017): 40–51.
  • Parsons, K., A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram. 2014. “Determining Employee Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q).” Computers & Security 42 (2014): 165–176.
  • Pattinson, M. R., and G. Anderson. 2007. “How Well are Information Risks Being Communicated to Your Computer End-Users?” Information Management & Computer Security 15 (5): 362–371.
  • Pattinson, M. R., M. A. Butavicius, K. Parsons, A. McCormac, and C. Jerram. 2015. “Examining Attitudes Toward Information Security Behaviour Using Mixed Methods.” In Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), 57–70. Lesvos, Greece: Plymouth University.
  • Pattinson, M. R., K. Parsons, M. Butavicius, A. McCormac, and D. Calic. 2016. “Assessing Information Security Attitudes: A Comparison of Two Studies.” Information & Computer Security 24 (2): 228–240.
  • Porter, S. R., M. E. Whitcomb, and W. H. Weitzer. 2004. “Multiple Surveys of Students and Survey Fatigue.” New Directions for Institutional Research 2004 (121): 63–73.
  • PWC. 2017. Strengthening digital society against cyber shocks - Key findings from The Global State of Information Security Survey 2018. Online: Price Waterhouse Coopers https://www.pwc.com/us/en/cybersecurity/assets/pwc-2018-gsiss-strengthening-digital-society-against-cyber-shocks.pdf.
  • Ray, J. J. 1984. “The Reliability of Short Social Desirability Scales.” Journal of Social Psychology 123 (1): 133–134.
  • Redmiles, E. M., Y. Acar, S. Fahl, and M. L. Mazurek. 2017. “A Summary of Survey Methodology Best Practices for Security and Privacy Researchers.” UM Computer Science Department Technical Reports.
  • Reynolds, W. M. 1982. “Development of Reliable and Valid Short Forms of the Marlowe-Crowne Social Desirability Scale.” Journal of Clinical Psychology 38 (1): 119–125.
  • Safa, N. S., R. Von Solms, and L. Futcher. 2016. “Human Aspects of Information Security in Organisations.” Computer Fraud & Security 2016 (2): 15–18.
  • Scholl, M., K. Leiner, and F. Fuhrmann. 2017. “Blind Spot: Do you Know the Effectiveness of Your Information Security Awareness-Raising Program?” In Proceedings of the 21st world Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2017), 361–366. Orlando, Florida, USA: International Institute of Informatics and Systemics.
  • Sekaran, U., and R. Bougie. 2010. Research Methods for Business: A Skill Building Approach. 5th ed. Chichester, United Kingdom: John Wiley & Sons.
  • Shay, R., S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor. 2010. “Encountering Stronger Password Requirements: User Attitudes and Behaviors.” In Proceedings of the Proceedings of the Sixth Symposium on Usable Privacy and Security, 1–20. Redmond, Washington, USA: ACM.
  • Snyman, D. P., and H. A. Kruger. 2016. “Behavioural Thresholds in the Context of Information Security.” In Proceedings of the 10th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), 22–32. Frankfurt, Germany: Plymouth University.
  • Snyman, D. P., and H. A. Kruger. 2017a. “The Application of Behavioural Thresholds to Analyse Collective Behaviour in Information Security.” Information & Computer Security 25 (2): 152–164.
  • Snyman, D. P., and H. A. Kruger. 2017b. “Optical Polling for Behavioural Threshold Analysis in Information Security.” In Proceedings of the International Conference on Information and Knowledge Engineering (IKE'17), 39–45. Las Vegas, USA: CSREA Press.
  • Snyman, D. P., H. A. Kruger, and W. D. Kearney. 2017. “The Lemming Effect in Information Security.” In Proceedings of the 11th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017), 91–103. Adelaide, Australia: Plymouth University.
  • Sommestad, T., and J. Hallberg. 2013. “A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance.” In Proceedings of the IFIP International Information Security Conference, 257–271. Auckland, New Zealand: Springer.
  • Sommestad, T., J. Hallberg, K. Lundholm, and J. Bengtsson. 2014. “Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies.” Information Management & Computer Security 22 (1): 42–75.
  • Stanton, J. M., K. R. Stam, P. Mastrangelo, and J. Jolton. 2005. “Analysis of End User Security Behaviors.” Computers & Security 24 (2): 124–133.
  • Tanis, M., and T. Postmes. 2005. “A Social Identity Approach to Trust: Interpersonal Perception, Group Membership and Trusting Behaviour.” European Journal of Social Psychology 35 (3): 413–424.
  • Vance, A., and M. T. Siponen. 2012. “IS Security Policy Violations: A Rational Choice Perspective.” Journal of Organizational and End User Computing (JOEUC) 24 (1): 21–41.
  • Van de Mortel, T. F. 2008. “Faking It: Social Desirability Response Bias in Self-Report Research.” The Australian Journal of Advanced Nursing 25 (4): 40–48.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.