An information security knowledge sharing model in organizations

Nader Sohrabi Safa, Rossouw Von Solms

Research output: Contribution to journalArticle

87 Citations (Scopus)

Abstract

Knowledge sharing plays an important role in the domain of information security, due to its positive effect on employees' information security awareness. It is acknowledged that security awareness is the most important factor that mitigates the risk of information security breaches in organizations. In this research, a model has been presented that shows how information security knowledge sharing (ISKS) forms and decreases the risk of information security incidents. The Motivation Theory and Theory of Planned Behavior besides Triandis model were applied as the theoretical backbone of the conceptual framework. The results of the data analysis showed that earning a reputation, and gaining promotion as an extrinsic motivation and curiosity satisfaction as an intrinsic motivation have positive effects on employees' attitude toward ISKS. However, self-worth satisfaction does not influence ISKS attitude. In addition, the findings revealed that attitude, perceived behavioral control, and subjective norms have positive effects on ISKS intention and ISKS intention affects ISKS behavior. The outcomes also showed that organizational support influences ISKS behavior more than trust. The results of this research should be of interest to academics and practitioners in the domain of information security.

Original languageEnglish
Pages (from-to)442-451
Number of pages10
JournalComputers in Human Behavior
Volume57
Early online date11 Jan 2016
DOIs
Publication statusPublished - 1 Apr 2016

Keywords

  • Behavior
  • Information security
  • Knowledge sharing
  • Motivation
  • Organization

ASJC Scopus subject areas

  • Arts and Humanities (miscellaneous)
  • Human-Computer Interaction
  • Psychology(all)

Fingerprint Dive into the research topics of 'An information security knowledge sharing model in organizations'. Together they form a unique fingerprint.

Cite this