Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action
Information Management & Computer Security
ISSN: 0968-5227
Article publication date: 21 November 2008
Abstract
Purpose
The purpose of this paper is to empirically validate the conjectural relationship between managerial information security awareness (MISA) and managerial actions toward information security (MATIS).
Design/methodology/approach
A model is developed and the relationship between MISA and MATIS is tested using a large set of empirical data collected across different types and sizes of enterprises. The hypotheses of the research model are tested with regression analysis.
Findings
The results of the study provide empirical support that MATIS is directly and positively related to MISA.
Research limitations/implications
The R2, an estimate of the proportion of the total variation in the data set that is explained by the model, is relatively low. This fact implies that there are other constructs in addition to MISA that play a crucial role in determining MATIS. The paper suggests that intention to act and the risk‐cost tradeoff of the MATIS are other possible constructs that should be incorporated into future research. The conceptual model employed as a theoretical basis also suggests that other factors such as the environment in which an organization operates (e.g. industry) also plays a major role in determining information security decisions independently of MISA. Other possible limitations include the use of secondary data in the study.
Practical implications
The results indicate that developing strategies to raise an organization's MISA should impact MATIS and thus improve information security performance.
Originality/value
The study provides empirical evidence supporting the unproven link between MISA and MATIS.
Keywords
Citation
Choi, N., Kim, D., Goo, J. and Whitmore, A. (2008), "Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action", Information Management & Computer Security, Vol. 16 No. 5, pp. 484-501. https://doi.org/10.1108/09685220810920558
Publisher
:Emerald Group Publishing Limited
Copyright © 2008, Emerald Group Publishing Limited