Identification of the Employee's Mental Patterns about the Policies of Information Security

The security of information systems is one of the most important challenges for today's organizations. Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not ag...

Full description

Saved in:
Bibliographic Details
Main Authors: ryhaneh zahra esfandiarpour, morteza Akbari
Format: Article
Language:English
Published: University of Tehran 2016-07-01
Series:Journal of Information Technology Management
Subjects:
Online Access:https://jitm.ut.ac.ir/article_57229_4a0f187555c8a71696748ce5e10a2523.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850193633411596288
author ryhaneh zahra esfandiarpour
morteza Akbari
author_facet ryhaneh zahra esfandiarpour
morteza Akbari
author_sort ryhaneh zahra esfandiarpour
collection DOAJ
description The security of information systems is one of the most important challenges for today's organizations. Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not agree with the organization security policies. Therefore, the field of end users security behaviors in the organization has received serious attention. In accordance with recent studies, end users have different security perspectives which have weakened the monitoring of user's security behaviors. Using Q methodology, this research attempted to identify employees’ mental patterns regarding information security policies to lead employees with the security requirements of the organization. In this regard, by reviewing previous researches as well as evaluating and summing up the discourse space, Q statements were selected and ranked by 31 employees of petroleum products Distribution Company. Constantly, analysis statements and four mental patterns were identified and classified as assessors, committed, relatives and people who consider deterrence tools helpful in line with information security policies.
format Article
id doaj-art-e2b20ca0640a4964b9712486eca89c08
institution OA Journals
issn 2008-5893
2423-5059
language English
publishDate 2016-07-01
publisher University of Tehran
record_format Article
series Journal of Information Technology Management
spelling doaj-art-e2b20ca0640a4964b9712486eca89c082025-08-20T02:14:11ZengUniversity of TehranJournal of Information Technology Management2008-58932423-50592016-07-018221523010.22059/jitm.2016.5722957229Identification of the Employee's Mental Patterns about the Policies of Information Securityryhaneh zahra esfandiarpour0morteza Akbari1Ph.D. Student in system Management, pardis farabi of Management University of Tehran, IranAssistant Prof., Faculty of entrepreneurship, Tehran University, Tehran, IranThe security of information systems is one of the most important challenges for today's organizations. Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not agree with the organization security policies. Therefore, the field of end users security behaviors in the organization has received serious attention. In accordance with recent studies, end users have different security perspectives which have weakened the monitoring of user's security behaviors. Using Q methodology, this research attempted to identify employees’ mental patterns regarding information security policies to lead employees with the security requirements of the organization. In this regard, by reviewing previous researches as well as evaluating and summing up the discourse space, Q statements were selected and ranked by 31 employees of petroleum products Distribution Company. Constantly, analysis statements and four mental patterns were identified and classified as assessors, committed, relatives and people who consider deterrence tools helpful in line with information security policies.https://jitm.ut.ac.ir/article_57229_4a0f187555c8a71696748ce5e10a2523.pdfAcceptance Information Security PolicyMental ModelsNational Iranian Oil Products Distribution CompanyQ Methodology
spellingShingle ryhaneh zahra esfandiarpour
morteza Akbari
Identification of the Employee's Mental Patterns about the Policies of Information Security
Journal of Information Technology Management
Acceptance Information Security Policy
Mental Models
National Iranian Oil Products Distribution Company
Q Methodology
title Identification of the Employee's Mental Patterns about the Policies of Information Security
title_full Identification of the Employee's Mental Patterns about the Policies of Information Security
title_fullStr Identification of the Employee's Mental Patterns about the Policies of Information Security
title_full_unstemmed Identification of the Employee's Mental Patterns about the Policies of Information Security
title_short Identification of the Employee's Mental Patterns about the Policies of Information Security
title_sort identification of the employee s mental patterns about the policies of information security
topic Acceptance Information Security Policy
Mental Models
National Iranian Oil Products Distribution Company
Q Methodology
url https://jitm.ut.ac.ir/article_57229_4a0f187555c8a71696748ce5e10a2523.pdf
work_keys_str_mv AT ryhanehzahraesfandiarpour identificationoftheemployeesmentalpatternsaboutthepoliciesofinformationsecurity
AT mortezaakbari identificationoftheemployeesmentalpatternsaboutthepoliciesofinformationsecurity