Sociološki aspekti rukovođenja i usklađenost ponašanja sa bezbednosnim politikama – uloga svesti zaposlenih o bezbednosti u namenskoj industriji

Ključne reči: informaciona bezbednost, namenska industrija, stilovi rukovođenja, svest o bezbednosti, bezbednosne mere

Sažetak


U digitalnom dobu bezbednost informacija dobija veći značaj, posebno u namenskoj industriji. Ova studija istražuje povezanost stilova rukovođenja i usklađenost ponašanja zaposlenih sa bezbednosnim politikama. Cilj studije je analiza posrednog uticaja transformacionog liderstva na usklađenost ponašanja zaposlenih sa bezbednosnim politikama, posredstvom koristi od svesti zaposlenih o bezbednosnim protivmerama. Korišćen je HBM model, prilagođen namenskoj industriji. U istraživanju je učestvovalo 300 ispitanika, iz četiri preduzeća. Identifikovane su zavisnosti između motivacije lidera i svesti zaposlenih o efikasnosti primene bezbednosnih protivmera. Rezultati ukazuju na ključne tačke za unapređenje, naglašavajući kontinuiranu edukaciju i motivaciju lidera u izgradnji bezbednosne kulture, što je od suštinskog značaja za uspeh u međunarodnoj trgovini preciznom mehanikom.

Reference

Aarons, G. A. (2006). Transformational and transactional leadership: Association with attitudes toward evidence-based practice. Psychiatric services, 57 (8). Available at: Transformational and Transactional Leadership: Association With Attitudes Toward Evidence-Based Practice | Psychiatric Services (psychiatryonline.org)

Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., Baskerville, R. L. (2020). How inte-gration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71 (8), 939–953. https://doi.org/10.1002/asi.24311

Anuar, H., Shah, S. A., Gafor, H., Mahmood, M. I., Ghazi, H. F. (2020). Usage of health belief model (HBM) in health behavior: A systematic review. Malaysian journal of medicine and health sciences, 16 (11), 2636–9346. Available at: 2021010809001826_2020_0366_.pdf (upm.edu.my)

Bhatti, O. K., Irfan, M., Öztürk, A. O. (2023). Influence of responsible leadership on inclusive organizations: A mixed-method study. International Journal of Organizational Leadership. Available at: https://acikerisim.medipol.edu.tr/xmlui/handle/20.500.12511/11006

Bolden, R., Gosling, J., Hawkins, B. (2023). Exploring leadership: Individual, organizational, and societal perspectives. Oxford University Press

Bulgurcu, H., Cavusoglu, H., Benbasat, I. (2009). Effects of individual and organization based beliefs and the moderating role of work experience on insiders’ good security behaviors, presented at 2009 International Conference on Computational Science and Engineering CSE ’09.

Cook, K. S., Cheshire, C. & Gerbasi, A. (2018). “Power, dependence, and social exchange theory”. Contemporary social psychological theories, 166–193. Available at: https://ieeexplore.ieee.org/abstract/document/5283116

Bass, B. M. (1960). Leadership, Psychology and Organizational Behavior. New York: Harper

Burns, J. M. G. (1978). Leadership. New York: Harper & Row

Da Veiga, A., Astakhova, L. V., Botha A., Herselman, M. (2020). Defining organizational information security culture – Perspectives from academia and industry. Computers and Security, 92, 191713. https://doi.org/10.1016/j.cose.2020.101713

Diesch, R., Plaff, M., Krcmar, H. (2020). “A comprehensive model of information secu-rity factor for decision-makers”. Computers and Security, 92, 101747. https://doi.org/10.1016/j.cose.2020.101747

Hagen, J. M., Albrechtsen, E., Hovden, J. (2008). Implementation and effectiveness of or-ganizational information security measures. Information Management & Computer Security, 16 (4), 377–397. https://doi.org/10.1108/09685220810908796

Hirschi, T. (2015). Social control theory: A control theory of delinquency. In: Criminology theory 289–305.

Hoffmeister, K., Gibbons, A. M., Johnson, S. K., Cigularov, K. P., Chen, P. Y., Rosecrance, J. C. (2014). The differential effects of transformational leadership facets on employee safety. Safety science, 62, 68–78. https://doi.org/10.1016/j.ssci.2013.07.004

Hovav, A., D’Arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information

& Management, 49 (2), 99–110. https://doi.org/10.1016/j.im.2011.12.005

Hu, Q., Dinev, T., Hart, P., Cooke, D. (2012). Managing employee compliance with informa-tion security policies: The critical role of top management and organizational culture. Decision Sciences, 43 (4), 615–660. https://doi.org/10.1111/j.1540-5915.2012.00361.x

Hugles-Lartey, J., Li, M., Botchey, F. E., Qin, Z. (2021). Human factor, a critical weak point in the information security of an organizations Internet of things. Heliyon, 7 (3). Available at: Human factor, a critical weak point in the information security of an organization’s Internet of things (cell.com)

Humaidi, N., Balakrishnan, V. (2015). Leadership styles and information security com-pliance behavior: mediator effect of information security awareness. International journal of information and education technology. Available at: Leadership-Styles-and-Information-Security-Compliance-Behavior-The-Mediator-Effect-of-Information-Security-Awareness.pdf (researchgate.net)

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31 (1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007

Jevtić, N., Alhudaidi, I. (2023). The importance of Information Security for Organizations. Serbian Journal of Engineering Management, 8 (2), 48–53. DOI: 10.5937/SJEM2302048J

Jevtić, N., Raut, D. (2024). Analysis of sociological aspects of information security using the HAIS-Q model. Sociološki pregled, 58 (1), 231–252. DOI: 10.5937/socpreg58-47480

Johnson, D. (2024). Leadership Fundamentals for Cybersecurity in Public Policy and Administration: Lessons for the Global South. Taylor & Francis. DOI: 10.4324/9781003496250

Kesić, D. B., Radojević, K. Z., Dželetović, M. U. (2022). The impact of the national security system on the prevention of security threats in the Republic of Serbia: attitudes of secondary school students, Sociološki pregled, 56 (1), 354–382. https://doi.org/10.5937/socpreg56-35763

Lordo, R. F. (2018). The importance of interdisciplinarity. Redefining the health belief model. Senior Theses, 220. Available at: https://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=1221&context=senior_theses;

Luknar, I. (2022). Abuse of information and communication technologies: Concept and organization in the Republic of Serbia. Politika nacionalne bezbednosti, 22 (1), 171–188. 171–188. DOI: 10.22182/pnb.2212022.8. [In Serbian]

MacMillan, J. (2021). Infosec strategies and best practices: Gain proficiency in information security using expert-level strategies and best practices. Packt Publishing Ltd. ISBN 978-1-80056-635-4

Mišić, A. M., Markov, S. (2012). Feminist critical discourse of leadership with emphasis on transformational leadership theory. Sociološki pregled, 46 (3), 341–365. DOI: 10.5937/socpreg1203341M

Morris, M. W., Hong, Y. Y., Chiu, C. Y., Liu, Z. (2015). Normology: Integrating insights about social norms to understand cultural dynamics. Organizational behavior and human decision processes, 129, 1–13. https://doi.org/10.1016/j.obhdp.2015.03.001

Puhakainen, P., Siponen, M. (2010). Improving employees’ compliance through information security training: An action research study. MIS Quarterly, 34 (4), 757–778. https://doi.org/10.2307/25750704

Raheli, H., Zarifian, S., Yazdanpanah, M. (2020). The power of the health belief model (HBM) to predict water demand management: A case study of farmers’ water con-servation in Iran. Journal of Environmental Management, https://doi.org/10.1016/j.jenvman.2020.110388

Von Solms, R., Von Solms, B. (2004). The 10 deadly sins of information security management. Computers & Security, 23 (5), 371–376. https://doi.org/10.1016/j.cose.2004.05.002

Yazdanpanah, M., Komendantova, N., Shirazu, Z. N., Linnerooth-Bayer, J. (2015). Green or in between? Examining youth perceptions of renewable energy in Iran. Energy Research & Social Science, 8, 78–85. https://doi.org/10.1016/j.erss.2015.04.011

Zhu, J., Feng, G., Liang, H., Tsui, K. L. (2023). How do paternalistic leaders motivate employees’ information security compliance? Building a climate and applying sanctions. Journal of the Association for Information Systems, 24 (3), 782–817. DOI: 10.17705/1jais.00794

Objavljeno
2025/07/04
Broj časopisa
Rubrika
Originalni naučni rad