Examining the Boundary Effect of Information Systems Security Behavior under Different Usage Purposes

2Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The purpose of information systems (IS) security behavior, represented by the difference between work and personal purpose, has been neglected in the research of user's IS security behavior. This is especially important for the organizations that allow or inevitably allow their employees to do personal tasks during work hours, because it may bring big threats to an organization's IS. Unfortunately, few empirical studies have examined if different behavioral purpose, typically, work/personal purpose, affects users' IS security behavior decision. Based on boundary theory and the idea of multidimensional rationality, we argue that people demarcate a psychological boundary for work and personal usages of IS and thus apply different rationalities to make IS security-related decisions. Our empirical investigation indicates that in a work usage context, people apply rule-based rationality and therefore are more influenced by mandatoriness and facilitating conditions. Whereas in a personal usage context, people apply outcome-based rationality and therefore are more concerned with task benefits and costs. The findings imply that organizations and vendors may devise different measures to ensure users' IS security behavior in different contexts.

References Powered by Scopus

Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies

56626Citations
N/AReaders
Get full text

Use of partial least squares (PLS) in strategic management research: A review of four recent studies

5447Citations
N/AReaders
Get full text

Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs

2628Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach

14Citations
N/AReaders
Get full text

Citizens’ Cybersecurity Behavior: Some Major Challenges

9Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Li, Y., Pan, T., & Zhang, N. (2019). Examining the Boundary Effect of Information Systems Security Behavior under Different Usage Purposes. IEEE Access, 7, 156544–156554. https://doi.org/10.1109/ACCESS.2019.2949079

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

58%

Professor / Associate Prof. 2

17%

Researcher 2

17%

Lecturer / Post doc 1

8%

Readers' Discipline

Tooltip

Computer Science 9

64%

Business, Management and Accounting 3

21%

Arts and Humanities 1

7%

Psychology 1

7%

Save time finding and organizing research with Mendeley

Sign up for free