Organizations spend billions of dollars on information and data security, and most of this expenditure is directed externally; however, there is ample evidence in the literature that employees account for most security breaches. For information security (IS) measures to work, employees need to adopt the organization’s information system security measures. To understand employees’ adoption of security systems in the manufacturing industry in the US, this empirical study tested the extended Technology Acceptance model and Theory of Planned behavior in relation to employees’ perceptions of the IS measures usefulness, ease of use, and subjective norms and how these perceptions predicted their intention to use the security measures. Additionally, under investigation was whether age and employees’ perception of managerial support moderated the aforementioned perceptions to affect employees’ intention to use the security measures. Results of a standard multiple regression and a hierarchical regression indicated that the TAM and the TBP explained variances in the DV; however, contrary to extant literature, employees’ perceived usefulness of IS measures did not statistically significantly predict their intention to use IS measures. Implications of these findings are discussed, as well as recommendations for future research.
|Advisor:||Gagnon, Sharon, Kaspszak, Jill|
|Commitee:||Braxton-Lieber, Sherri, Robinsonlind, Mary|
|Department:||School of Business and Technology|
|School Location:||United States -- Minnesota|
|Source:||DAI-B 76/12(E), Dissertation Abstracts International|
|Subjects:||Management, Information Technology, Industrial arts education|
|Keywords:||Employee adoption, Information security measures, Manufacturing system, Technology acceptance model|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be