The Establishment of Information Security Knowledge Sharing in Organizations: Antecedents and Consequences

Drawing on the extant literature on information security and neo-institutional theory, we develop and test a theoretical model to investigate the antecedents and consequences of the establishment of information security knowledge sharing (ISKS) in organizations. The model was tested using survey dat...

Full description

Bibliographic Details
Main Authors: Hassandoust, F (Author), Subasinghage, MN (Author), Johnston, AC (Author)
Format: Others
Published: Association for Information Systems (AIS), 2020-10-22T22:32:17Z.
Subjects:
Online Access:Get fulltext
LEADER 01782 am a22001813u 4500
001 13735
042 |a dc 
100 1 0 |a Hassandoust, F  |e author 
700 1 0 |a Subasinghage, MN  |e author 
700 1 0 |a Johnston, AC  |e author 
245 0 0 |a The Establishment of Information Security Knowledge Sharing in Organizations: Antecedents and Consequences 
260 |b Association for Information Systems (AIS),   |c 2020-10-22T22:32:17Z. 
500 |a PACIS 2020 Proceedings. 244. https://aisel.aisnet.org/pacis2020/244 
520 |a Drawing on the extant literature on information security and neo-institutional theory, we develop and test a theoretical model to investigate the antecedents and consequences of the establishment of information security knowledge sharing (ISKS) in organizations. The model was tested using survey data from 403 top managers, who are aware of information security policies of their organizations. Our results suggest that external information security knowledge resources find their way into the organization by normative, mimetic, and coercive means, but much of their influence on ISKS practices are mediated by ISKS beliefs held by top management. Results highlight that firms face uncertainty in their ISKS practices and find themselves simply mirroring the practices of their peers without a real understanding of how that approach fits their organization's capacity for ISKS. Our findings emphasize the importance of ISKS practices for ensuring security compliance and the establishment and proliferation of an effective security culture. 
540 |a OpenAccess 
650 0 4 |a Information security knowledge sharing; Neo-institutional theory; Security compliance; Security culture 
655 7 |a Conference Contribution 
856 |z Get fulltext  |u http://hdl.handle.net/10292/13735