Information security collaboration formation in organisations

Nader Sohrabi Safa, Carsten Maple, Tim Watson, Steve Furnell

Research output: Contribution to journalArticlepeer-review

10 Citations (Scopus)


The protection of organisational information assets requires the collaboration of all employees; information security collaboration (ISC) aggregates the efforts of employees in order to mitigate the effect of information security breaches and incidents. However, it is acknowledged that ISC formation and its development needs more investigation. This research endeavours to show how ISC forms and develops in the context of an organisation based on social bond factors. The social bond theory and theory of planned behaviour describe the effect of social bond factors on the attitude of employees and finally their behaviour regarding collaboration in the domain of information security. The results of the data analysis reveal that personal norms, involvement, and commitment to their organisation significantly influence the employees' attitude towards ISC intention. However, contrary to the authors expectation, attachment does not influence the attitude of employees towards ISC. In addition, attitudes towards ISC, perceived behavioural control, and personal norms significantly affect the intention of employees towards ISC. The findings also show that the employees' intention towards ISC and organisational support positively influence ISC, but that trust does not significantly affect ISC behaviour.

Original languageEnglish
Pages (from-to)238-245
Number of pages8
JournalIET Information Security
Issue number3
Early online date14 Dec 2017
Publication statusPublished - 1 May 2018
Externally publishedYes


  • Data analysis
  • Behavioural sciences computing
  • Organisational aspects
  • Personnel
  • Security of data

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Computer Networks and Communications


Dive into the research topics of 'Information security collaboration formation in organisations'. Together they form a unique fingerprint.

Cite this