Eliciting and modelling expert knowledge
Decision Support Systems
Diversity in information systems action research methods
European Journal of Information Systems
Multidimensional scaling for group memory visualization
Decision Support Systems - From information retrieval to knowledge management: enabling technologies and best practices
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Combining IS Research Methods: Towards a Pluralist Methodology
Information Systems Research
Enemy at the gate: threats to information security
Communications of the ACM - Program compaction
Generalizing Generalizability in Information Systems Research
Information Systems Research
Why there aren't more information security research studies
Information and Management
Understanding qualitative data: a framework of text analysis methods
Journal of Management Information Systems - Special section: Strategic and competitive information systems
Relating electronic mail use and network structure to R&D work networks and performance
Journal of Management Information Systems
Journal of Management Information Systems
Evaluating information assurance strategies
Decision Support Systems
The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust
The qualitative interview in IS research: Examining the craft
Information and Organization
Expertise visualization: an implementation and study based on cognitive fit theory
Decision Support Systems
A Taxonomy of Antecedents of Information Systems Success: Variable Analysis Studies
Journal of Management Information Systems
Journal of Management Information Systems
International Journal of Electronic Commerce
Knowledge Management Strategies: Toward a Taxonomy
Journal of Management Information Systems
Deterring internal information systems misuse
Communications of the ACM
An empirical investigation of anti-spyware software adoption: A multitheoretical perspective
Information and Management
Computers in Human Behavior
Journal of Management Information Systems
Studying users' computer security behavior: A health belief perspective
Decision Support Systems
Information Systems Research
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention
Communications of the ACM - The Status of the P versus NP Problem
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
Does deterrence work in reducing information security policy abuse by employees?
Communications of the ACM
The nature of theory in information systems
MIS Quarterly
Information about information: a taxonomy of views
MIS Quarterly
Hi-index | 0.00 |
Protecting information from a variety of security threats is a daunting organizational activity. Organization managers must recognize the roles that organization insiders have in protecting information resources rather than solely relying upon technology to provide this protection. Unfortunately, compared to negative insider behaviors, the extant literature provides sparse coverage of beneficial insider activities. The few beneficial activities in the literature represent only a small portion of the diverse collection of insiders' protective actions. This research focuses on protection-motivated behaviors (PMBs), which are volitional behaviors enacted by organization insiders to protect (1) organizationally relevant information and (2) the computer-based information systems in which the information is stored, collected, disseminated, and/or manipulated from information security threats. Based on systematics, we propose a six-step methodology of qualitative and quantitative approaches to develop a taxonomy and theory of diversity for PMBs. These approaches integrate the classification techniques of multidimensional scaling (MDS), property fitting (ProFit), and cluster analyses. We leverage these techniques to identify and display how insiders collectively classify 67 unique PMBs and their homogeneous classes. Our taxonomy provides researchers and practitioners a comprehensive guide and common nomenclature for PMBs. Our methodology can be similarly used to create other theories of diversity.