{"title":"基于自我决定理论的信息安全合规行为概念模型","authors":"Yotamu Gangire, A. D. Veiga, M. Herselman","doi":"10.1109/ICTAS.2019.8703629","DOIUrl":null,"url":null,"abstract":"The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"A conceptual model of information security compliant behaviour based on the self-determination theory\",\"authors\":\"Yotamu Gangire, A. D. Veiga, M. Herselman\",\"doi\":\"10.1109/ICTAS.2019.8703629\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory.\",\"PeriodicalId\":386209,\"journal\":{\"name\":\"2019 Conference on Information Communications Technology and Society (ICTAS)\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Conference on Information Communications Technology and Society (ICTAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTAS.2019.8703629\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Conference on Information Communications Technology and Society (ICTAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTAS.2019.8703629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A conceptual model of information security compliant behaviour based on the self-determination theory
The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory.