Identification of the Employee's Mental Patterns about the Policies of Information Security
The security of information systems is one of the most important challenges for today's organizations. Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not ag...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Tehran
2016-07-01
|
| Series: | Journal of Information Technology Management |
| Subjects: | |
| Online Access: | https://jitm.ut.ac.ir/article_57229_4a0f187555c8a71696748ce5e10a2523.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850193633411596288 |
|---|---|
| author | ryhaneh zahra esfandiarpour morteza Akbari |
| author_facet | ryhaneh zahra esfandiarpour morteza Akbari |
| author_sort | ryhaneh zahra esfandiarpour |
| collection | DOAJ |
| description | The security of information systems is one of the most important challenges for today's organizations. Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not agree with the organization security policies. Therefore, the field of end users security behaviors in the organization has received serious attention. In accordance with recent studies, end users have different security perspectives which have weakened the monitoring of user's security behaviors. Using Q methodology, this research attempted to identify employees’ mental patterns regarding information security policies to lead employees with the security requirements of the organization. In this regard, by reviewing previous researches as well as evaluating and summing up the discourse space, Q statements were selected and ranked by 31 employees of petroleum products Distribution Company. Constantly, analysis statements and four mental patterns were identified and classified as assessors, committed, relatives and people who consider deterrence tools helpful in line with information security policies. |
| format | Article |
| id | doaj-art-e2b20ca0640a4964b9712486eca89c08 |
| institution | OA Journals |
| issn | 2008-5893 2423-5059 |
| language | English |
| publishDate | 2016-07-01 |
| publisher | University of Tehran |
| record_format | Article |
| series | Journal of Information Technology Management |
| spelling | doaj-art-e2b20ca0640a4964b9712486eca89c082025-08-20T02:14:11ZengUniversity of TehranJournal of Information Technology Management2008-58932423-50592016-07-018221523010.22059/jitm.2016.5722957229Identification of the Employee's Mental Patterns about the Policies of Information Securityryhaneh zahra esfandiarpour0morteza Akbari1Ph.D. Student in system Management, pardis farabi of Management University of Tehran, IranAssistant Prof., Faculty of entrepreneurship, Tehran University, Tehran, IranThe security of information systems is one of the most important challenges for today's organizations. Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not agree with the organization security policies. Therefore, the field of end users security behaviors in the organization has received serious attention. In accordance with recent studies, end users have different security perspectives which have weakened the monitoring of user's security behaviors. Using Q methodology, this research attempted to identify employees’ mental patterns regarding information security policies to lead employees with the security requirements of the organization. In this regard, by reviewing previous researches as well as evaluating and summing up the discourse space, Q statements were selected and ranked by 31 employees of petroleum products Distribution Company. Constantly, analysis statements and four mental patterns were identified and classified as assessors, committed, relatives and people who consider deterrence tools helpful in line with information security policies.https://jitm.ut.ac.ir/article_57229_4a0f187555c8a71696748ce5e10a2523.pdfAcceptance Information Security PolicyMental ModelsNational Iranian Oil Products Distribution CompanyQ Methodology |
| spellingShingle | ryhaneh zahra esfandiarpour morteza Akbari Identification of the Employee's Mental Patterns about the Policies of Information Security Journal of Information Technology Management Acceptance Information Security Policy Mental Models National Iranian Oil Products Distribution Company Q Methodology |
| title | Identification of the Employee's Mental Patterns about the Policies of Information Security |
| title_full | Identification of the Employee's Mental Patterns about the Policies of Information Security |
| title_fullStr | Identification of the Employee's Mental Patterns about the Policies of Information Security |
| title_full_unstemmed | Identification of the Employee's Mental Patterns about the Policies of Information Security |
| title_short | Identification of the Employee's Mental Patterns about the Policies of Information Security |
| title_sort | identification of the employee s mental patterns about the policies of information security |
| topic | Acceptance Information Security Policy Mental Models National Iranian Oil Products Distribution Company Q Methodology |
| url | https://jitm.ut.ac.ir/article_57229_4a0f187555c8a71696748ce5e10a2523.pdf |
| work_keys_str_mv | AT ryhanehzahraesfandiarpour identificationoftheemployeesmentalpatternsaboutthepoliciesofinformationsecurity AT mortezaakbari identificationoftheemployeesmentalpatternsaboutthepoliciesofinformationsecurity |