Conference PaperPDF Available

Security Violation Prevention: CPTED in the context of information Security Emergent Research Forum (ERF)

Authors:

Abstract

Mitigating Information Security (IS) violations is a crucial since organizations relying more on their information systems. This cannot be achieved only by advancements in security software and hardware technologies, but also there is a need to have multi-perspective approaches toward security violation prevention in organizations. Thus, we apply Crime Prevention through Environmental Design (CPTED) approach to develop conceptual research model in the context of IS. Our model considers both technical and non-technical perspectives as well as covers human-related, managerial and physical aspects of IS management. Moreover, we propose the moderation roles of two personality traits (trait anxiety and negative affectivity) on the relationships between all five variables of the research model and IS violation because impacts of personality is an inseparable part of human behaviors. To our best knowledge, this is the first study that applied CPTED into IS domain. This may help to reduce security violation in the organization.
CPTED Approach and Prevent IS Security Violation
Twenty-fourth Americas Conference on Information Systems, New Orleans, 2018 1
Security Violation Prevention: CPTED in the
context of information Security
Emergent Research Forum (ERF)
Sahar Farshadkhah
Louisiana Tech University
sfa005@latech.edu
Jaeung Lee
Louisiana Tech University
jakelee@latech.edu
Abstract
Mitigating Information Security (IS) violations is a crucial since organizations relying more on their
information systems. This cannot be achieved only by advancements in security software and hardware
technologies, but also there is a need to have multi-perspective approaches toward security violation
prevention in organizations. Thus, we apply Crime Prevention through Environmental Design (CPTED)
approach to develop conceptual research model in the context of IS. Our model considers both technical
and non-technical perspectives as well as covers human-related, managerial and physical aspects of IS
management. Moreover, we propose the moderation roles of two personality traits (trait anxiety and
negative affectivity) on the relationships between all five variables of the research model and IS violation
because impacts of personality is an inseparable part of human behaviors. To our best knowledge, this is
the first study that applied CPTED into IS domain. This may help to reduce security violation in the
organization.
Keywords
Information security violation, Crime prevention, CPTED, Personality traits.
ResearchGate has not been able to resolve any citations for this publication.
ResearchGate has not been able to resolve any references for this publication.