{"title":"IT assimilation: construct, measurement, and implications in cybersecurity","authors":"L. Goel, Z. Zhang, Steven A. Williamson","doi":"10.1080/17517575.2022.2052187","DOIUrl":null,"url":null,"abstract":"ABSTRACT Unintentional employee behaviours can be a major cause of security breaches. To mitigate the risk, employees need to habituate their new behaviours, implying a transfer of learning that may occur at ‘work’ to ‘personal’ contexts. Against this backdrop, we examine a new construct – IT Assimilation – grounded in situated learning theory by its definition as the incorporation of enterprise IT into an individual’s IT repertoire. We use a multi-phase methodological approach to conceptualise the construct and develop a validated scale to measure it. Our findings offer valuable insights for researchers and practitioners about transferring IT behaviours, particularly in the cybersecurity context..","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Enterprise Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/17517575.2022.2052187","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 2
Abstract
ABSTRACT Unintentional employee behaviours can be a major cause of security breaches. To mitigate the risk, employees need to habituate their new behaviours, implying a transfer of learning that may occur at ‘work’ to ‘personal’ contexts. Against this backdrop, we examine a new construct – IT Assimilation – grounded in situated learning theory by its definition as the incorporation of enterprise IT into an individual’s IT repertoire. We use a multi-phase methodological approach to conceptualise the construct and develop a validated scale to measure it. Our findings offer valuable insights for researchers and practitioners about transferring IT behaviours, particularly in the cybersecurity context..
期刊介绍:
Enterprise Information Systems (EIS) focusses on both the technical and applications aspects of EIS technology, and the complex and cross-disciplinary problems of enterprise integration that arise in integrating extended enterprises in a contemporary global supply chain environment. Techniques developed in mathematical science, computer science, manufacturing engineering, and operations management used in the design or operation of EIS will also be considered.