{"title":"工作到家庭网络安全溢出:构建开发和验证","authors":"L. Goel, Z. Zhang, Steven A. Williamson","doi":"10.1080/10580530.2022.2128116","DOIUrl":null,"url":null,"abstract":"ABSTRACT The COVID-19 pandemic has forced employees to work from home using enterprise systems outside traditional organizational boundaries. Thus, organizations cannot enforce security policies for safe IT use behaviors but depend on continuance intentions of work policies at home. We study the transfer of IT security behaviors from work to home by developing the construct of Work-to-Home Cybersecurity Spillover and empirically testing and validating it. Our findings provide practical implications for researchers and practitioners in cybersecurity.","PeriodicalId":56289,"journal":{"name":"Information Systems Management","volume":"40 1","pages":"290 - 300"},"PeriodicalIF":3.0000,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Work-to-Home Cybersecurity Spillover: Construct Development and Validation\",\"authors\":\"L. Goel, Z. Zhang, Steven A. Williamson\",\"doi\":\"10.1080/10580530.2022.2128116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT The COVID-19 pandemic has forced employees to work from home using enterprise systems outside traditional organizational boundaries. Thus, organizations cannot enforce security policies for safe IT use behaviors but depend on continuance intentions of work policies at home. We study the transfer of IT security behaviors from work to home by developing the construct of Work-to-Home Cybersecurity Spillover and empirically testing and validating it. Our findings provide practical implications for researchers and practitioners in cybersecurity.\",\"PeriodicalId\":56289,\"journal\":{\"name\":\"Information Systems Management\",\"volume\":\"40 1\",\"pages\":\"290 - 300\"},\"PeriodicalIF\":3.0000,\"publicationDate\":\"2022-10-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Systems Management\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1080/10580530.2022.2128116\",\"RegionNum\":3,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Systems Management","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/10580530.2022.2128116","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Work-to-Home Cybersecurity Spillover: Construct Development and Validation
ABSTRACT The COVID-19 pandemic has forced employees to work from home using enterprise systems outside traditional organizational boundaries. Thus, organizations cannot enforce security policies for safe IT use behaviors but depend on continuance intentions of work policies at home. We study the transfer of IT security behaviors from work to home by developing the construct of Work-to-Home Cybersecurity Spillover and empirically testing and validating it. Our findings provide practical implications for researchers and practitioners in cybersecurity.
期刊介绍:
Information Systems Management (ISM) is the on-going exchange of academic research, best practices, and insights based on managerial experience. The journal’s goal is to advance the practice of information systems management through this exchange.
To meet this goal, ISM features themed papers examining a particular topic. In addition to themed papers, the journal regularly publishes on the following topics in IS management.
Achieving Strategic IT Alignment and Capabilities
IT Governance
CIO and IT Leadership Roles
IT Sourcing
Planning and Managing an Enterprise Infrastructure
IT Security
Selecting and Delivering Application Solutions
Portfolio Management
Managing Complex IT Projects
E-Business Technologies
Supporting Knowledge Work
The target readership includes both academics and practitioners. Hence, submissions integrating research and practice, and providing implications for both, are encouraged.