Reference Hub31
Information Security Effectiveness: Conceptualization and Validation of a Theory

Information Security Effectiveness: Conceptualization and Validation of a Theory

Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford
Copyright: © 2007 |Volume: 1 |Issue: 2 |Pages: 24
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203307|EISSN: 1930-1669|DOI: 10.4018/jisp.2007040103
Cite Article Cite Article

MLA

Knapp, Kenneth J., et al. "Information Security Effectiveness: Conceptualization and Validation of a Theory." IJISP vol.1, no.2 2007: pp.37-60. http://doi.org/10.4018/jisp.2007040103

APA

Knapp, K. J., Marshall, T. E., Rainer Jr., R. K., & Ford, F. N. (2007). Information Security Effectiveness: Conceptualization and Validation of a Theory. International Journal of Information Security and Privacy (IJISP), 1(2), 37-60. http://doi.org/10.4018/jisp.2007040103

Chicago

Knapp, Kenneth J., et al. "Information Security Effectiveness: Conceptualization and Validation of a Theory," International Journal of Information Security and Privacy (IJISP) 1, no.2: 37-60. http://doi.org/10.4018/jisp.2007040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Taking a sequential qualitative-quantitative methodological approach, we propose and test a theoretical model that includes four variables through which top management can positively influence security effectiveness: user training, security culture, policy relevance, and policy enforcement. During the qualitative phase of the study, we generated the model based on textual responses to a series of questions given to a sample of 220 information security practitioners. During the quantitative phase, we analyzed survey data collected from a sample of 740 information security practitioners. After data collection, we analyzed the survey responses using structural equation modeling and found evidence to support the hypothesized model. We also tested an alternative, higher-order factor version of the original model that demonstrated an improved overall fit and general applicability across the various demographics of the sampled data. We then linked the finding of this study to existing top management support literature, general deterrence theory research, and the theoretical notion of the dilemma of the supervisor.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.