Chu, 2014: Development and Validation of Instruments of Information Security Deviant Behavior

Topic:

Two instruments of Information security deviant behavior (ISDB) are proposed and tested, including a four-item instrument of resource misuse (ISDB that is related to the misuse of information systems resources) and a three-item instrument of security carelessness (ISDB that is related to the employees' omissive activities when using computers or handling data). A rigorous instrument development process which includes three surveys and addresses six crucial measurement properties (content analysis, factorial validity, reliability, convergent validity, discriminant validity, and nomological validity) is adopted.

instrument validation, 204, 242 and 213 respondents each, most comprehensive validation seen

Constructs in this publication:

Construct Cites Category Questions given? Content validity Pretests Response type Notes
Resource misuse NEW Information security deviant behavior yes 4 stages of validation with 3 surveys multiple pilots seven-point Likert scales ranging from "strongly disagree" to "strongly agree"
Security carelessness NEW Information security deviant behavior yes 4 stages of validation with 3 surveys multiple pilots seven-point Likert scales ranging from "strongly disagree" to "strongly agree"
Implicit knowledge sharing Bock et al., 2005 yes no none unclear
Software piracy Kwan et al., 2010 yes no none unclear
Nonwork-related computing Lee et al., 2007 yes no none unclear
Helping behaviour Colquitt, 2001 yes no none unclear
Security policy D'Arcy et al., 2009 yes no none unclear
Security awareness program D'Arcy, 2007 yes no none unclear

Citation:

Amanda MY Chu and Patrick YK Chau. Development and validation of instruments of information security deviant behavior. Decision Support Systems, 66:93–101, 2014.

Bibtex


@article{chu_development_2014,
 author = {Chu, Amanda MY and Chau, Patrick YK},
 journal = {Decision Support Systems},
 pages = {93--101},
 title = {Development and Validation of Instruments of Information Security Deviant Behavior},
 volume = {66},
 year = {2014}
}