IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Non-Compliant Mobile Device Usage and Information Systems Security: A Bystander Theory Perspective

Non-Compliant Mobile Device Usage and Information Systems Security: A Bystander Theory Perspective
View Sample PDF
Author(s): Narasimha Paravastu (University of Central Missouri, Warrensburg, Missouri, United States), Claire A. Simmers (Saint Joseph's University, Philadelphia, Pennsylvania, United States)and Murugan Anandarajan (Drexel University, Philadelphia, Pennsylvania, United States)
Copyright: 2018
Volume: 9
Issue: 1
Pages: 25
Source title: International Journal of Information Systems and Social Change (IJISSC)
Editor(s)-in-Chief: John Wang (Montclair State University, USA)
DOI: 10.4018/IJISSC.2018010101

Purchase

View Non-Compliant Mobile Device Usage and Information Systems Security: A Bystander Theory Perspective on the publisher's website for pricing and purchasing information.

Abstract

This study tested the context of employees using their devices for both work and personal use, and non-compliant device usage of a person potentially resulting in Information Systems (IS) security threat to personal as well as work data and/or the devices. Integrating bystander and protection motivation theory (PMT) perspectives this paper studies bystanders' responses to IS security threats and the extent to which a perceived security threat motivates individual intention to act, in the context of non-compliant mobile device usage behaviors. It tests the role of an individual's threat perceptions to protect their own IS security, and as a bystander, protecting their peers or the IS security of their organization. Data collected from 431 individuals support the hypotheses that security awareness predicts perceived severity and protection motivation. Evaluation apprehension and diffusion of responsibility inhibit bystander's intentions to act against non-compliant mobile device usage behaviors, while awareness facilitates it. Theoretical contributions and practical implications of the research are discussed.

Related Content

Narasimha S. Paravastu, Sam Ramanujan. © 2024. 18 pages.
Lawrence Arokiasamy, Takemi Fujikawa, Shishi Kumar Piaralal, Thilageswary Arumugam. © 2024. 32 pages.
Mohamad Albakjaji, Reem Almarzouqi. © 2024. 15 pages.
Haytham Youssef Darwish, Mahmoud Farouk, Mohammed Abdelsalam. © 2024. 18 pages.
Huiyun Yang. © 2024. 16 pages.
. © 2024.
Gary Kwok, Cai Lian Tam. © 2023. 18 pages.
Body Bottom