IT assimilation: construct, measurement, and implications in cybersecurity

IF 4.4 4区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
L. Goel, Z. Zhang, Steven A. Williamson
{"title":"IT assimilation: construct, measurement, and implications in cybersecurity","authors":"L. Goel, Z. Zhang, Steven A. Williamson","doi":"10.1080/17517575.2022.2052187","DOIUrl":null,"url":null,"abstract":"ABSTRACT Unintentional employee behaviours can be a major cause of security breaches. To mitigate the risk, employees need to habituate their new behaviours, implying a transfer of learning that may occur at ‘work’ to ‘personal’ contexts. Against this backdrop, we examine a new construct – IT Assimilation – grounded in situated learning theory by its definition as the incorporation of enterprise IT into an individual’s IT repertoire. We use a multi-phase methodological approach to conceptualise the construct and develop a validated scale to measure it. Our findings offer valuable insights for researchers and practitioners about transferring IT behaviours, particularly in the cybersecurity context..","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Enterprise Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/17517575.2022.2052187","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 2

Abstract

ABSTRACT Unintentional employee behaviours can be a major cause of security breaches. To mitigate the risk, employees need to habituate their new behaviours, implying a transfer of learning that may occur at ‘work’ to ‘personal’ contexts. Against this backdrop, we examine a new construct – IT Assimilation – grounded in situated learning theory by its definition as the incorporation of enterprise IT into an individual’s IT repertoire. We use a multi-phase methodological approach to conceptualise the construct and develop a validated scale to measure it. Our findings offer valuable insights for researchers and practitioners about transferring IT behaviours, particularly in the cybersecurity context..
信息技术同化:网络安全的构建、衡量和影响
摘要员工的非故意行为可能是安全漏洞的主要原因。为了降低风险,员工需要习惯他们的新行为,这意味着可能在“工作”中发生的学习转移到“个人”环境中。在这种背景下,我们研究了一种基于情境学习理论的新结构——信息技术同化,其定义是将企业信息技术纳入个人信息技术库。我们使用多阶段的方法论方法来概念化该结构,并制定一个经过验证的量表来衡量它。我们的发现为研究人员和从业者提供了关于转移it行为的宝贵见解,特别是在网络安全背景下。。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Enterprise Information Systems
Enterprise Information Systems 工程技术-计算机:信息系统
CiteScore
11.00
自引率
6.80%
发文量
24
审稿时长
6 months
期刊介绍: Enterprise Information Systems (EIS) focusses on both the technical and applications aspects of EIS technology, and the complex and cross-disciplinary problems of enterprise integration that arise in integrating extended enterprises in a contemporary global supply chain environment. Techniques developed in mathematical science, computer science, manufacturing engineering, and operations management used in the design or operation of EIS will also be considered.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信