Show simple item record

dc.contributor.authorSohrabi Safa, Nen
dc.contributor.authorMaple, Cen
dc.contributor.authorWatson, Ten
dc.contributor.authorFurnell, SMen
dc.date.accessioned2018-01-08T11:39:30Z
dc.date.available2018-01-08T11:39:30Z
dc.date.issued2017-12-14en
dc.identifier.issn1751-8709en
dc.identifier.urihttp://hdl.handle.net/10026.1/10487
dc.description.abstract

Collaboration between employees in the domain of information security efficiently mitigates the effect of information security attacks on organisations. Collaboration means working together to do or to fulfil a shared goal, the target of which in this paper is the protection of the information assets in organisations. Information Security Collaboration (ISC) aims to aggregate the employees’ contribution against information security threats. This study clarifies how ISC is to be developed and how it helps to reduce the effect of attacks. The socialisation of collaboration in the domain of information security applies two essential theories: Social Bond Theory (SBT) and the Theory of Planned Behaviour (TPB). The results of the data analysis revealed that personal norms, involvement, and commitment significantly influence the employees’ attitude towards ISC intention. However, contrary to our expectation, attachment does not influence the attitude of employees towards ISC. In addition, attitudes towards ISC, perceived behavioural control, and personal norms significantly affect the intention towards ISC. The findings also show that the intention for ISC and organisational support positively influence ISC, but that trust does not significantly affect ISC behaviour.

en
dc.format.extent? - ? (11)en
dc.language.isoenen
dc.publisherInstitution of Engineering and Technologyen
dc.subjectInformation securityen
dc.subjectCollaborationen
dc.subjectRisken
dc.titleInformation security collaboration formation in organisationsen
dc.typeJournal Article
plymouth.publication-statusPublished onlineen
plymouth.journalIET Information Securityen
dc.identifier.doi10.1049/iet-ifs.2017.0257en
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Professional Services staff
dcterms.dateAccepted2017-12-12en
dc.identifier.eissn1751-8717en
dc.rights.embargoperiodNot knownen
rioxxterms.versionofrecord10.1049/iet-ifs.2017.0257en
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserveden
rioxxterms.licenseref.startdate2017-12-14en
rioxxterms.typeJournal Article/Reviewen


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
@mire NV