首页> 外文会议>Americas conference on information systems >Identifying and Measuring the Dimensions of Risky IT Behavior
【24h】

Identifying and Measuring the Dimensions of Risky IT Behavior

机译:识别和衡量风险IT行为的维度

获取原文

摘要

As the use of personal mobile computing devices is growing exponentially, many organizations are implementing BYOD programs that allow employees access corporate networks using their mobile devices. Consequently, these devices can become a vehicle to transfer the risky IT behavior of individuals to enterprises. The ubiquitous, multifunctional, and highly-connected nature of mobile devices create a unique context for studying risky use of these devices. Previous IS security research has studied adoption of protective technologies. However, there is a lack of research on measuring different dimensions of risky IT behavior and how they can be influenced by using protective technologies. To address this gap, we develop a survey to identify and measure the individuals' risky IT behaviors on mobile devices. We will then extend our research to investigate antecedents of users' risky IT behaviors across different devices.
机译:随着个人移动计算设备的使用呈指数增长,许多组织正在实施BYOD程序,该程序允许员工使用其移动设备访问公司网络。因此,这些设备可以成为将个人的危险IT行为转移给企业的工具。移动设备的无处不在,多功能和高度连接的特性为研究这些设备的风险使用创造了独特的环境。先前的IS安全研究已经研究了保护技术的采用。但是,缺乏关于测量风险IT行为的不同维度以及如何通过使用保护性技术来影响它们的研究。为了解决这一差距,我们开展了一项调查,以识别和衡量个人在移动设备上的风险IT行为。然后,我们将扩展研究范围,以调查跨不同设备的用户风险性IT行为的前因。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号