To Örebro University

oru.seÖrebro University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Social action theory for understanding information security non-compliance in hospitals: the importance of user rationale
Örebro University, Swedish Business School at Örebro University. (Informatik)ORCID iD: 0000-0003-2304-7170
Örebro University, Örebro University School of Business. (Informatik)ORCID iD: 0000-0002-3265-7627
Örebro University, Örebro University School of Business. (Informatik)
2013 (English)In: Information Management & Computer Security, ISSN 0968-5227, E-ISSN 1758-5805, Vol. 21, no 4, p. 266-287Article in journal (Refereed) Published
Abstract [en]

Purpose – Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security.

Design/methodology/approach – This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a combination of interviews, information security documents, and observations. Data were analysed using a combination of a value-based compliance model and the taxonomy laid out in SAT to determine user rationality.

Findings – The paper argues that management of information security and design of countermeasures should be based on an understanding of users' rationale covering both intentional and unintentional non-compliance. The findings are presented in propositions with practical and theoretical implications: P1. Employees' non-compliance is predominantly based on means-end calculations and based on a practical rationality, P2. An information security investigation of employees' rationality should not be based on an a priori assumption about user intent, P3. Information security management and choice of countermeasures should be based on an understanding of the use rationale, and P4. Countermeasures should target intentional as well as unintentional non-compliance.

Originality/value – This work is an extension of Hedström et al. arguing for the importance of addressing user rationale for successful management of information security. The presented propositions can form a basis for information security management, making the objectives underlying the study presented in Hedström et al. more clear

Place, publisher, year, edition, pages
2013. Vol. 21, no 4, p. 266-287
Keywords [en]
Compliance, Information Security, User rationale, Social Action Theory, User behavior
National Category
Information Systems, Social aspects
Research subject
Informatics
Identifiers
URN: urn:nbn:se:oru:diva-32081DOI: 10.1108/IMCS-08-2012-0043Scopus ID: 2-s2.0-84886458518OAI: oai:DiVA.org:oru-32081DiVA, id: diva2:658244
Available from: 2013-10-21 Created: 2013-10-21 Last updated: 2017-12-06Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Hedström, KarinKarlsson, FredrikKolkowska, Ella

Search in DiVA

By author/editor
Hedström, KarinKarlsson, FredrikKolkowska, Ella
By organisation
Swedish Business School at Örebro UniversityÖrebro University School of Business
In the same journal
Information Management & Computer Security
Information Systems, Social aspects

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 913 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf