Cultivating Safety in the Information Technology Era
Abstract
Keywords
DOI: 10.22146/gamajop.47415
References
Ahlan, A. R., Lubis, M., & Lubis, A. R. (2015). Information security awareness at the knowledge-based institution: Its antecedents and measures. Procedia Computer Science, 72, 361–373. doi: http://doi.org/10.1016/j.procs.2015.12.151
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behaviour, 38, 304–312. doi: https://doi.org/10.1016/j.chb.2014.05.046
Baskerville, R. & Siponen, M. (2002). An information security meta-policy for emergent organizations. Logistics Information Management, 15(5/6), 337-346. doi: https://doi.org/10.1108/09576050210447019
Bulgurcu, B., Cavusoglu, H.,& Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523-548.
Castiglione, N. D. (2002). “My social security number is”: Some common sense ways to fight identity theft. ABA Banking Journal, 94(12), 57-59.
Chan, M., Woon, I., & Kakanhalli. (2005). Perceptions of information security at the workplace: Linking information security climate to compliant behavior. Journal of Information Privacy and Security, 1(3), 18-41.
Dang-Pham, D. Pittayachawan, S., & Bruno, V. (2015). Factors of people centric security climate: Conceptual model and exploratory study in Vietnam. Paper presented at The 26th Australasian Conference on Information Systems. University of South Australia, Adelaide.
Dhillon, G., & Backhouse, J., (2001). Current directions in IS security research: Towards socio‐organizational perspectives. Information Systems Journal, 11(2), 127-153. doi: https://doi.org/10.1046/j.1365-2575.2001.00099.x
Dlamini, M. T., Eloff, J. H. P., Elff., M. M., (2009). Information security: The moving target. Computer & Security, 28, 189-198. doi: https://doi.org/10.1016/j.cose.2008.11.007
Franke, V. (2011). Strategic decision-making under uncertainty : Using case studies for teaching strategy in complex environments. Journal of Military and Strategic Studies, 13(2), 1–21.
Glendon, A.I. & Stanton, N.A. (2000). Perspective on safety culture. Safety Science, 34(1-3), 193--214. doi: https://doi.org/10.1016/S0925-7535(00)00013-8
Goo, J., Yim, M.-S., & Kim, D. J. (2013). A path way to successful management of individual intentions to security compliance: A role of organizational security climate. Paper presented at Hawaii International Conference on System Sciences.
Graham, J.R., & Harvey, C.R. (2001). The theory and practice of corporate finance: Evidence from the field. Journal of Financial Economics, 60(2), 187-243. doi: https://doi.org/10.1016/S0304-405X(01)00044-7
Griffin, M.A., & Neal, A. (2000). Perceptions of safety at work: A framework for linking safety climate to safety performance, knowledge, and motivation. Journal of Occupational Health Psychology, 5(3). 347-358. doi: https://doi.org/10.1037//1076-8998.5.3.347
Grote, G. (2007). Understanding and assessing safety culture through the lens of organizational management of uncertainty. Safety Science, 45(6), 637-652. doi: https://doi.org/10.1016/j.ssci.2007.04.002
Hiller, J. S. (2010). The regulatory framework for privacy and security. In J. Hunsinger, L. Klastrup, & M. Allen (Eds.) International Handbook of Internet Research (pp. 251–265). Dordrecht: Springer.
Ilvonen, I.(2011). Information Security Culture or Information Safety Culture-What do words convey? Paper presented at the 10th European Conference on Information Warfare and Security, The Institute of Cybernetics at the Tallinn University of Technology, Tallinn, Estonia. Academic Confereeces International Limited, 148-154.
Jaafar, I.N.,& Ajis, A. (2013). Organizational climate and individual factors effects on information security compliance behaviour. International Journal of Busines and Social Science, 4(10), 118-130.
Kaleem, A. & Ahmad, S. (2008). Bankers’ perception of electronic banking in Pakistan. Journal of Internet Banking and Commerce 13(1), 1-16.
Kamp, J. (2001). It’s time to drag behavioral safety into the cognitive era. Professional Safety, October, 30-34.
Nasution, M, F, F, A. (2012). Institutionalization of information security: Case of the Indonesian banking sector (Unpublished doctoral dissertation). Virginia Commonwealth University, Richmond, Virginia.
Reason, J. (2000). Human error: Models and management. BMJ, 320(7237), 768-770. doi: https://dx.doi.org/10.1136/bmj.320.7237.768
Saint-Germain, R. (2005). Information security management best practice based on ISO/IEC. 17799. The international information security standard provides a framework for ensuring business continuity, maintaining legal compliance, and achieving a competitive edge at the core. Information Management Journal, 39(4). 60-62.
Schou, C. D., & Trimmer, K. J. (2004). Information assurance and security. Journal of Organizational and End User Computing, 16(3), 1-13.
Shrivastava, S., Sonpar, K., & Pazzaglia, F. (2009). Normal Accident Theory versus High Reability Theory: A resolution and call for an open system view of accidents. Human Relations, 62(9), 1357-1390. doi: https://doi.org/10.1177/0018726709339117
Stanton, J.M., Stam, K.R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computer & Security, 24(2), 124-133. doi: https://doi.org/10.1016/j.cose.2004.07.001
Vroom, C., & Von Solms, R. (2004). Towards information security behavioural compliance. Computers & Security, 23(3), 191-198. doi: https://doi.org/10.1016/j.cose.2004.01.012
Willig, C. (2008). Introducing qualitative research in psychology (2nd ed.). Berkshire: Open University Press.
Zacharatos, A., Barling, J., & Iverson, R. D. (2005). High-performance work systems and occupational safety. Journal of Applied Psychology, 90(1), 77–93. doi: http://doi.org/10.1037/0021-9010.90.1.77
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Gadjah Mada Journal of Psychology (GamaJoP)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.