Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2008)
Electronic transaction act of Ghana
Shawneequa Callier, John Huss, E. Juengst (2010)
GINA and Preemployment Criminal Background ChecksHastings Center Report, 40
M. Jakobsson, Peter Finn, N. Johnson (2008)
Why and How to Perform Fraud ExperimentsIEEE Security & Privacy, 6
(2005)
Information technology – code of practice for information security management
(2010)
General aspects regarding signing an individual work contract
Joseph Hair, M. Sarstedt, C. Ringle, Jeanette Mena (2012)
An assessment of the use of partial least squares structural equation modeling in marketing researchJournal of the Academy of Marketing Science, 40
William Tate (2011)
Global business operations require increased efforts in international background screeningEmployment Relations Today, 38
Peter Ross, Greg Bamber (2009)
Strategic Choices in Pluralist and Unitarist Employment Relations Regimes: A Study of Australian TelecommunicationsIndustrial & Labor Relations Review, 63
E. Fama, M. Jensen (1983)
Separation of Ownership and ControlThe Journal of Law and Economics, 26
Michael Jensen, W. Meckling (1976)
Harvard Business School; SSRN; National Bureau of Economic Research (NBER); European Corporate Governance Institute (ECGI); Harvard University - Accounting & Control UnitLSN: Law & Finance: Empirical (Topic)
M. Mastilak, Linda Matuszewski, F. Miller, Alexander Woods (2018)
Self-fulfilling Prophecy? An Examination of Exposure to Agency Theory and Unethical Behavior, 21
(2015)
Hire right the first time
J. Robinson (2010)
Baxter and the Return of Physician-Assisted SuicideHastings Center Report, 40
Emily Carson (2010)
Off the Record: Why the EEOC Should Change Its Guidelines regarding Employers' Consideration of Employees' Criminal Records during the Hiring ProcessThe Journal of Corporation Law, 36
J. Ford, L. Willey, B. White, Theresa Domagalski (2015)
New Concerns in Electronic Employee Monitoring: Have You Checked Your Policies Lately?Journal of Legal, Ethical and Regulatory Issues, 18
(2011)
Preamble for the legal and regulatory framework
R. Copeland, Mel Schnake (2016)
Protected Classes, Credit Histories and Criminal Background Checks: A New Twist to Old-Fashioned Disparate Impact Cases?Journal of Business and Behavior Sciences, 28
René Saint-Germain (2005)
Information Security Management Best Practice Based on ISO/IEC 17799
C. Williams, A. Kayaoglu (2017)
Evaluating the prevalence of employees without written terms of employment in the European UnionEmployee Relations, 39
(2013)
COBIT 4.1 PO7 manage IT human resources – process description
(2013)
Information technology security techniques - code of practice for information security controls
George Valiris, M. Glykas (2004)
Business analysis metrics for business process redesignBus. Process. Manag. J., 10
(2013)
The regulations of the obligatory provisions of the individual employment contract
Stefan Bauer, Edward Bernroider (2015)
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring
M. Bishop, D. Gollmann, J. Hunker, C.W. Probst (2008)
Countering insider threats, in Dagstuhl seminar proceedings, Dagstuhl, Germany, number 08302, 2008
Dan Harnesk, J. Lindström (2011)
Shaping security behaviour through discipline and agilityInformation Management & Computer Security, 19
L. Futcher, Cheryl Schroder, R. Solms (2016)
Information Management & Computer Security Information security education in South Africa
Jie Liu, Tian Xia, Wei Jiang (2014)
A Posteriori Error Estimates with Computable Upper Bound for the Nonconforming Rotated Q 1 Finite Element Approximation of the Eigenvalue ProblemsMathematical Problems in Engineering, 2014
Q. Coleman (2017)
What are the different theories of industrial relations?
Jonathan Branker, T. Eveleigh, T. Holzer, S. Sarkani (2016)
Access control, identity management and the insider threatJournal of Airport Management, 10
(2014)
Features of the employment contract with the teaching staff of educational organization of higher education
M. Poole (2009)
Response to Jones and Karsten, Giddens's structuration theory and information systems researchManagement Information Systems Quarterly, 33
Journal of Financial Economics, 3
B. Khoo, P. Harris, Stephen Hartman (2011)
Information Security Governance Of Enterprise Information Systems: An Approach To Legislative Compliant, 14
H. Abdullah (2009)
Fundamental and Ethics Theories of Corporate Governance
Babajide Osatuyi (2015)
Personality Traits and Information Privacy Concern on Social Media PlatformsJournal of Computer Information Systems, 55
M. Glasner (2014)
Background Screening in APAC: Trends and ChallengesEmployment Relations Today, 41
C. Probst, Jeffrey Hunker, M. Bishop, D. Gollmann (2008)
08302 Summary - Countering Insider Threats
Dn Dagbanja (2016)
The Right to Privacy and Data Protection in Ghana
(2019)
Complete background screening
Dan Harnesk, J. Lindström (2011)
Shaping Security Behavior through Discipline and Agility: Implications for Information Security ManagementInf. Manag. Comput. Secur., 19
(2017)
Personnel and people security advice and measures
Laurie Lapidus (2013)
Criminal Background Checks Can't Remain in the Background AnymoreJournal of accountancy, 215
K. Arrow (1985)
Informational Structure of the FirmThe American Economic Review, 75
N. Liang, D. Biros, A. Luse (2016)
An Empirical Validation of Malicious Insider CharacteristicsJournal of Management Information Systems, 33
Benedikt Lebek, J. Uffen, Markus Neumann, B. Hohler, M. Breitner (2014)
Information security awareness and behavior: a theory-based literature reviewManagement Research Review, 37
Sean Smith
Secure Systems
Information Management and Computer Security, 18
C. Wilkin, R. Chenhall (2010)
A Review of IT Governance: A Taxonomy to Inform Accounting Information SystemsJ. Inf. Syst., 24
A. Sarode, Sagar Deore (2017)
Role of third party employee verification and background checks in HR management: An overviewJournal of Commerce and Management Thought, 8
K. Eisenhardt (1989)
Agency Theory: An Assessment and ReviewAcademy of Management Review, 14
E. Yu, J. Mylopoulos (1994)
Understanding "why" in software process modelling, analysis, and designProceedings of 16th International Conference on Software Engineering
Josh Bendickson, J. Muldoon, E. Liguori, Phillip Davis (2016)
Agency theory: background and epistemologyJournal of Management History, 22
(2013)
Changes in employee relations: impact of perceived organizational support on the social exchange of the outsourcing industry in Sri Lanka
Tove Bøe, Boge Gulbrandsen, Øystein Sørebø (2015)
How to stimulate the continued use of ICT in higher education: Integrating Information Systems Continuance Theory and agency theoryComput. Hum. Behav., 50
M. Ahmad, Adeel Akram, Muhammad Asif, Saeed Ur-Rehman (2014)
Using Genetic Algorithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows EnvironmentMathematical Problems in Engineering, 2014
M. Harris, A. Raviv (1979)
Optimal incentive contracts with imperfect informationJournal of Economic Theory, 20
S. Hughes, E. Keller, Giles Hertz (2010)
Homeland security initiatives and background checks in higher educationNew Directions for Institutional Research, 2010
Frederic Qc, J. Qc (2012)
Reserving the Right to Change Terms and Conditions: How Far Can the Employer Go?Industrial Law Journal, 41
A. Singh, M. Gupta, Amitabh Ojha (2014)
Identifying factors of "organizational information security management"J. Enterp. Inf. Manag., 27
Alexandre Padilla (2002)
Can agency theory justify the regulation of insider trading?The Quarterly Journal of Austrian Economics, 5
Qing Hu, Tamara Dinev, Paul Hart, Donna Cooke (2012)
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational CultureDecis. Sci., 43
John Donovan, Stephen Dwight, Danielle Schneider (2014)
The Impact of Applicant Faking on Selection Measures, Hiring Decisions, and Employee PerformanceJournal of Business and Psychology, 29
日本規格協会 (2013)
情報技術-セキュリティ技術-情報セキュリティ管理策の実践のための規範 : ISO/IEC 27002 = Information technology-Security techniques-Code of practice for information security controls : ISO/IEC 27002
J. Roach (2016)
Would Standardized Job Testing Assist Employers in Hiring the Right EmployeeMonthly Labor Review
R. Brody, F. Perri, Harry III (2015)
Further Beyond the Basic Background Check: Predicting Future Unethical BehaviorEconomic Perspectives on Employment & Labor Law eJournal
E. Karanja (2017)
The role of the chief information security officer in the management of IT securityInf. Comput. Secur., 25
Yan Chen, K. Ramamurthy, Kuang-Wei Wen (2015)
Impacts of Comprehensive Information Security Programs on Information Security CultureJournal of Computer Information Systems, 55
IEEE Security and Privacy Magazine, 6
This study aims to develop a conceptual model and assess the extent to which pre-, during- and post-employment HR security controls are applied in organizations to manage information security risks.Design/methodology/approachThe conceptual model is developed based on the agency theory and the review of theoretical, empirical and practitioner literature. Following, empirical data are collected through a survey from 134 IT professionals, internal audit personnel and HR managers working within five major industry sectors in a developing country to test the organizational differences in pre-, during- and post-employment HR security measures.FindingsUsing analysis of variance, the findings reveal significant differences among the organizations. Financial institutions perform better in employee background checks, terms and conditions of employment, management responsibilities, security education, training and awareness and disciplinary process. Conversely, healthcare institutions outperform other organizations in post-employment security management. The government public institutions perform the worst among all the organizations.Originality/valueAn integration of a conceptual model with HR security controls is an area that is under-researched and under-reported in information security and human resource management literature. Accordingly, this research on HR security management contributes to reducing such a gap and adds to the existing HR security risk management literature. It, thereby, provides an opportunity for researchers to conduct comparative studies between developed and developing nations or to benchmark a specific organization’s HR security management.
Information and Computer Security – Emerald Publishing
Published: Jun 19, 2019
Keywords: Information security; Agency theory; Security education; Background check; Computer training; HR security risk management; Personnel security; Human resource security; Conditions of employment; Management responsibilities; Training and awareness; Disciplinary process
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.