Sociološki aspekti rukovođenja i usklađenost ponašanja sa bezbednosnim politikama – uloga svesti zaposlenih o bezbednosti u namenskoj industriji
Sažetak
U digitalnom dobu bezbednost informacija dobija veći značaj, posebno u namenskoj industriji. Ova studija istražuje povezanost stilova rukovođenja i usklađenost ponašanja zaposlenih sa bezbednosnim politikama. Cilj studije je analiza posrednog uticaja transformacionog liderstva na usklađenost ponašanja zaposlenih sa bezbednosnim politikama, posredstvom koristi od svesti zaposlenih o bezbednosnim protivmerama. Korišćen je HBM model, prilagođen namenskoj industriji. U istraživanju je učestvovalo 300 ispitanika, iz četiri preduzeća. Identifikovane su zavisnosti između motivacije lidera i svesti zaposlenih o efikasnosti primene bezbednosnih protivmera. Rezultati ukazuju na ključne tačke za unapređenje, naglašavajući kontinuiranu edukaciju i motivaciju lidera u izgradnji bezbednosne kulture, što je od suštinskog značaja za uspeh u međunarodnoj trgovini preciznom mehanikom.
Reference
Aarons, G. A. (2006). Transformational and transactional leadership: Association with attitudes toward evidence-based practice. Psychiatric services, 57 (8). Available at: Transformational and Transactional Leadership: Association With Attitudes Toward Evidence-Based Practice | Psychiatric Services (psychiatryonline.org)
Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., Baskerville, R. L. (2020). How inte-gration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71 (8), 939–953. https://doi.org/10.1002/asi.24311
Anuar, H., Shah, S. A., Gafor, H., Mahmood, M. I., Ghazi, H. F. (2020). Usage of health belief model (HBM) in health behavior: A systematic review. Malaysian journal of medicine and health sciences, 16 (11), 2636–9346. Available at: 2021010809001826_2020_0366_.pdf (upm.edu.my)
Bhatti, O. K., Irfan, M., Öztürk, A. O. (2023). Influence of responsible leadership on inclusive organizations: A mixed-method study. International Journal of Organizational Leadership. Available at: https://acikerisim.medipol.edu.tr/xmlui/handle/20.500.12511/11006
Bolden, R., Gosling, J., Hawkins, B. (2023). Exploring leadership: Individual, organizational, and societal perspectives. Oxford University Press
Bulgurcu, H., Cavusoglu, H., Benbasat, I. (2009). Effects of individual and organization based beliefs and the moderating role of work experience on insiders’ good security behaviors, presented at 2009 International Conference on Computational Science and Engineering CSE ’09.
Cook, K. S., Cheshire, C. & Gerbasi, A. (2018). “Power, dependence, and social exchange theory”. Contemporary social psychological theories, 166–193. Available at: https://ieeexplore.ieee.org/abstract/document/5283116
Bass, B. M. (1960). Leadership, Psychology and Organizational Behavior. New York: Harper
Burns, J. M. G. (1978). Leadership. New York: Harper & Row
Da Veiga, A., Astakhova, L. V., Botha A., Herselman, M. (2020). Defining organizational information security culture – Perspectives from academia and industry. Computers and Security, 92, 191713. https://doi.org/10.1016/j.cose.2020.101713
Diesch, R., Plaff, M., Krcmar, H. (2020). “A comprehensive model of information secu-rity factor for decision-makers”. Computers and Security, 92, 101747. https://doi.org/10.1016/j.cose.2020.101747
Hagen, J. M., Albrechtsen, E., Hovden, J. (2008). Implementation and effectiveness of or-ganizational information security measures. Information Management & Computer Security, 16 (4), 377–397. https://doi.org/10.1108/09685220810908796
Hirschi, T. (2015). Social control theory: A control theory of delinquency. In: Criminology theory 289–305.
Hoffmeister, K., Gibbons, A. M., Johnson, S. K., Cigularov, K. P., Chen, P. Y., Rosecrance, J. C. (2014). The differential effects of transformational leadership facets on employee safety. Safety science, 62, 68–78. https://doi.org/10.1016/j.ssci.2013.07.004
Hovav, A., D’Arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information
& Management, 49 (2), 99–110. https://doi.org/10.1016/j.im.2011.12.005
Hu, Q., Dinev, T., Hart, P., Cooke, D. (2012). Managing employee compliance with informa-tion security policies: The critical role of top management and organizational culture. Decision Sciences, 43 (4), 615–660. https://doi.org/10.1111/j.1540-5915.2012.00361.x
Hugles-Lartey, J., Li, M., Botchey, F. E., Qin, Z. (2021). Human factor, a critical weak point in the information security of an organizations Internet of things. Heliyon, 7 (3). Available at: Human factor, a critical weak point in the information security of an organization’s Internet of things (cell.com)
Humaidi, N., Balakrishnan, V. (2015). Leadership styles and information security com-pliance behavior: mediator effect of information security awareness. International journal of information and education technology. Available at: Leadership-Styles-and-Information-Security-Compliance-Behavior-The-Mediator-Effect-of-Information-Security-Awareness.pdf (researchgate.net)
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31 (1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007
Jevtić, N., Alhudaidi, I. (2023). The importance of Information Security for Organizations. Serbian Journal of Engineering Management, 8 (2), 48–53. DOI: 10.5937/SJEM2302048J
Jevtić, N., Raut, D. (2024). Analysis of sociological aspects of information security using the HAIS-Q model. Sociološki pregled, 58 (1), 231–252. DOI: 10.5937/socpreg58-47480
Johnson, D. (2024). Leadership Fundamentals for Cybersecurity in Public Policy and Administration: Lessons for the Global South. Taylor & Francis. DOI: 10.4324/9781003496250
Kesić, D. B., Radojević, K. Z., Dželetović, M. U. (2022). The impact of the national security system on the prevention of security threats in the Republic of Serbia: attitudes of secondary school students, Sociološki pregled, 56 (1), 354–382. https://doi.org/10.5937/socpreg56-35763
Lordo, R. F. (2018). The importance of interdisciplinarity. Redefining the health belief model. Senior Theses, 220. Available at: https://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=1221&context=senior_theses;
Luknar, I. (2022). Abuse of information and communication technologies: Concept and organization in the Republic of Serbia. Politika nacionalne bezbednosti, 22 (1), 171–188. 171–188. DOI: 10.22182/pnb.2212022.8. [In Serbian]
MacMillan, J. (2021). Infosec strategies and best practices: Gain proficiency in information security using expert-level strategies and best practices. Packt Publishing Ltd. ISBN 978-1-80056-635-4
Mišić, A. M., Markov, S. (2012). Feminist critical discourse of leadership with emphasis on transformational leadership theory. Sociološki pregled, 46 (3), 341–365. DOI: 10.5937/socpreg1203341M
Morris, M. W., Hong, Y. Y., Chiu, C. Y., Liu, Z. (2015). Normology: Integrating insights about social norms to understand cultural dynamics. Organizational behavior and human decision processes, 129, 1–13. https://doi.org/10.1016/j.obhdp.2015.03.001
Puhakainen, P., Siponen, M. (2010). Improving employees’ compliance through information security training: An action research study. MIS Quarterly, 34 (4), 757–778. https://doi.org/10.2307/25750704
Raheli, H., Zarifian, S., Yazdanpanah, M. (2020). The power of the health belief model (HBM) to predict water demand management: A case study of farmers’ water con-servation in Iran. Journal of Environmental Management, https://doi.org/10.1016/j.jenvman.2020.110388
Von Solms, R., Von Solms, B. (2004). The 10 deadly sins of information security management. Computers & Security, 23 (5), 371–376. https://doi.org/10.1016/j.cose.2004.05.002
Yazdanpanah, M., Komendantova, N., Shirazu, Z. N., Linnerooth-Bayer, J. (2015). Green or in between? Examining youth perceptions of renewable energy in Iran. Energy Research & Social Science, 8, 78–85. https://doi.org/10.1016/j.erss.2015.04.011
Zhu, J., Feng, G., Liang, H., Tsui, K. L. (2023). How do paternalistic leaders motivate employees’ information security compliance? Building a climate and applying sanctions. Journal of the Association for Information Systems, 24 (3), 782–817. DOI: 10.17705/1jais.00794
Sva prava zadržana (c) 2025 Sociološki pregled

Ovaj rad je pod Creative Commons Autorstvo-Deli pod istim uslovima 4.0 međunarodnom licencom.
