{"id":3892,"date":"2022-05-22T04:02:13","date_gmt":"2022-05-22T04:02:13","guid":{"rendered":"https:\/\/www.tarleton.edu\/cob\/?p=3892"},"modified":"2026-02-10T20:45:46","modified_gmt":"2026-02-10T20:45:46","slug":"unlocking-cybersecurity-excellence-the-role-of-work-ethic-in-shaping-security-behavior","status":"publish","type":"post","link":"https:\/\/www.tarleton.edu\/cob\/2022\/05\/22\/unlocking-cybersecurity-excellence-the-role-of-work-ethic-in-shaping-security-behavior\/","title":{"rendered":"Unlocking Cybersecurity Excellence: The Role of Work Ethic in Shaping Security Behavior"},"content":{"rendered":"\n<div class=\"wp-block-cover\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"600\" class=\"wp-block-cover__image-background wp-image-957 size-full\" alt=\"Man in a gray Tarleton State University polo shirt with a purple background.\" src=\"https:\/\/www.tarleton.edu\/cob\/wp-content\/uploads\/sites\/103\/2022\/05\/schuessler-joseph-2020.jpg\" style=\"object-position:51% 32%\" data-object-fit=\"cover\" data-object-position=\"51% 32%\" srcset=\"https:\/\/www.tarleton.edu\/cob\/wp-content\/uploads\/sites\/103\/2022\/05\/schuessler-joseph-2020.jpg 400w, https:\/\/www.tarleton.edu\/cob\/wp-content\/uploads\/sites\/103\/2022\/05\/schuessler-joseph-2020-200x300.jpg 200w, https:\/\/www.tarleton.edu\/cob\/wp-content\/uploads\/sites\/103\/2022\/05\/schuessler-joseph-2020-267x400.jpg 267w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<p id=\"ember52\">In our recent study, we delved into the complex interplay between work ethic and individuals&#8217; perceptions of and intentions to use security measures within professional settings. Utilizing SmartPLS 3.0 software, we conducted a rigorous analysis of data, uncovering valuable insights that not only contribute to academic knowledge but also have significant implications for practitioners in various industries.<\/p>\n\n\n\n<p id=\"ember53\">Our research primarily focused on assessing reflective constructs such as centrality of work, delay of gratification, hard work, leisure, morality and ethics, self-reliance, wasted time, perceived importance, and intention to use. Through comprehensive reliability and validity testing, we confirmed the robustness of our measurement model, ensuring that the constructs under study exhibited sufficient reliability, internal consistency, convergent validity, and discriminant validity.<\/p>\n\n\n\n<p id=\"ember54\">The structural model analysis revealed intriguing findings regarding the relationship between work ethic dimensions and information security behavior. Notably, dimensions like leisure, morality and ethics, self-reliance, and wasted time showed a positive relationship with perceived importance, supporting hypotheses related to these constructs. Surprisingly, certain dimensions like centrality of work, delay of gratification, and hard work did not exhibit significant relationships with perceived importance or intention to use security measures as hypothesized.<\/p>\n\n\n\n<p id=\"ember55\">One of the key takeaways from our study is the potential for future research to explore the nuances of work ethic further. Researchers could delve into specific dimensions of work ethic, considering factors such as personal values, cultural influences, and organizational contexts to deepen our understanding of how these aspects shape information security behavior. Additionally, investigating the moderating effects of variables like job roles, industry types, and technological advancements could provide a more nuanced perspective on the relationship between work ethic and security behaviors.<\/p>\n\n\n\n<p id=\"ember56\">From a practical standpoint, our findings have important implications for human resource personnel, organizational leaders, and cybersecurity professionals. Incorporating assessments of work ethic dimensions related to security consciousness during recruitment processes can help identify candidates predisposed towards responsible security practices. Tailoring security training programs to resonate with different work ethic profiles can enhance their effectiveness, while crafting flexible yet robust policies aligned with varying work ethic perceptions can foster better compliance and adherence to security protocols.<\/p>\n\n\n\n<p id=\"ember57\">Furthermore, our study underscores the significance of cultivating a strong security culture within organizations. By promoting values such as diligence, ethical conduct, self-reliance, and time management alongside emphasizing the importance of security measures, organizations can foster a climate where security becomes ingrained in everyday practices rather than seen as an external imposition.<\/p>\n\n\n\n<p id=\"ember58\">Beyond individual organizations, our findings also have broader industry relevance. Collaborative efforts to standardize assessments of work ethic dimensions related to security behaviors can lead to more effective talent management strategies across sectors. Sharing best practices and research insights regarding the interplay between work ethic and security behaviors can contribute to collective learning and continuous improvement in cybersecurity practices at a broader industry level.<\/p>\n\n\n\n<p id=\"ember59\">In conclusion, our study not only advances academic knowledge but also offers actionable insights for practitioners to strengthen their cybersecurity posture, nurture a security-conscious workforce, and contribute to a more resilient and secure business environment.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p id=\"ember60\"><a href=\"https:\/\/www.emerald.com\/insight\/search?q=Thiagarajan%20Ramakrishnan\">Ramakrishnan, T.<\/a>, <a href=\"https:\/\/www.emerald.com\/insight\/search?q=Dwight%20M.%20Hite\">Hite, D.M.<\/a>, <a href=\"https:\/\/www.emerald.com\/insight\/search?q=Joseph%20H.%20Schuessler\">Schuessler, J.H.<\/a> and <a href=\"https:\/\/www.emerald.com\/insight\/search?q=Victor%20Prybutok\">Prybutok, V.<\/a> (2022), &#8220;Work ethic and information security behavior&#8221;, <a href=\"https:\/\/www.emerald.com\/insight\/publication\/issn\/2056-4961\"><em>Information and Computer Security<\/em><\/a>, Vol. 30 No. 3, pp. 364-381. <a href=\"https:\/\/doi.org\/10.1108\/ICS-02-2021-0017\">https:\/\/doi.org\/10.1108\/ICS-02-2021-0017<\/a><\/p>\n\n\n\n<p id=\"ember61\"><strong>Abstract:<\/strong><\/p>\n\n\n\n<p id=\"ember62\">Purpose<\/p>\n\n\n\n<p id=\"ember63\">Information security is a growing issue that impacts organizations in virtually all industries, and data breaches impact millions of customers and cost organizations millions of dollars. Within the past several years alone, huge data breaches have been experienced by organizations such as Marriot, Equifax, eBay, JP Morgan Chase, Home Depot, Target and Yahoo, the latter of which impacted three billion users. This study aims to examine the utilization of pre-employment screening to identify potential hires that may require enhanced information security training to avoid such costs.<\/p>\n\n\n\n<p id=\"ember64\">Design\/methodology\/approach<\/p>\n\n\n\n<p id=\"ember65\">The authors hypothesize that an individual\u2019s work ethic predicts a person\u2019s information security behavior. The authors test this hypothesis using structural equation modeling with bootstrapping techniques.<\/p>\n\n\n\n<p id=\"ember66\">Findings<\/p>\n\n\n\n<p id=\"ember67\">Data analysis suggests that certain dimensions of work ethic do indeed predict information security posture, and thus, simple pre-employment screening techniques (i.e. questionnaires) can aid in identifying potential security threats.<\/p>\n\n\n\n<p id=\"ember68\">Practical implications<\/p>\n\n\n\n<p id=\"ember69\">The findings provide a tool for identifying problematic employee security posture prior to hiring, which may be useful in identifying training needs for new hires.<\/p>\n\n\n\n<p id=\"ember70\">Originality\/value<\/p>\n\n\n\n<p id=\"ember71\">The findings provide a tool for identifying problematic employee security posture prior to hiring, which may be useful in identifying training needs for new hires.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ember72\">Dr. Joseph H. Schuessler (2011)<\/h3>\n\n\n\n<p id=\"ember73\"><em>Professor of Business Computer Information Systems<\/em><\/p>\n\n\n\n<p id=\"ember74\"><em>Dr. Sam Pack College of Business<\/em><\/p>\n\n\n\n<p id=\"ember75\">Email: <a href=\"mailto:schuessler@tarleton.edu\"><strong>schuessler@tarleton.edu<\/strong><\/a><\/p>\n\n\n\n<p id=\"ember76\">Office: <a href=\"https:\/\/www.tarleton.edu\/fortworth\/wp-content\/uploads\/sites\/203\/2022\/10\/directions-fortworth.pdf\"><strong>Fort Worth Building, Room 323<\/strong><\/a><\/p>\n\n\n\n<p id=\"ember77\">Phone: <strong>682-703-7068<\/strong><\/p>\n\n\n\n<p id=\"ember78\">Visit <a href=\"https:\/\/drschuessler.wordpress.com\/\"><strong>Dr. Schuessler\u2019s Website<\/strong><\/a><\/p>\n\n\n\n<p id=\"ember79\">Program Coordinator for MBA Program<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ember80\">More Info:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PhD, University of North Texas, Business Computer Information Systems, 2009<\/li>\n\n\n\n<li>MS, University of North Texas, Information Technology, 2003<\/li>\n\n\n\n<li>MBA,&nbsp;University of North Texas, Business Computer Information Systems, 2001<\/li>\n\n\n\n<li>BBA, University of North Texas, Strategic Management, 1994<\/li>\n<\/ul>\n\n\n\n<p id=\"ember84\"><strong>Teaching Interests: <\/strong>Network Administration, Network Security<\/p>\n\n\n\n<p id=\"ember85\"><strong>Research Interests: <\/strong>Computer and Network Security<\/p>\n\n\n\n<p id=\"ember86\"><strong>Professional certifications and licenses:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>CompTIA A+<\/em><\/li>\n\n\n\n<li><em>TestOut PC Pro<\/em><\/li>\n\n\n\n<li><em>CompTIA Network+<\/em><\/li>\n\n\n\n<li><em>TestOut Network Pro<\/em><\/li>\n\n\n\n<li><em>CompTIA Security+<\/em><\/li>\n\n\n\n<li><em>ACUE Certified in Effective Online Teaching<\/em><\/li>\n\n\n\n<li><em>QM Certified Master Reviewer<\/em><\/li>\n\n\n\n<li><em>QM Peer Reviewer<\/em><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Ramakrishnan, Hite, Schuessler, Prybutok, 2022\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/LkeilGcoziw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>In our recent study, we delved into the complex interplay between work ethic and individuals&#8217; perceptions of and intentions to use security measures within professional settings. Utilizing SmartPLS 3.0 software, &#8230;<\/p>\n","protected":false},"author":93,"featured_media":580,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","wds_primary_category":33,"footnotes":""},"categories":[33],"tags":[48,46,49,47],"class_list":["post-3892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-intellectual-contributions","tag-employment-screening","tag-information-security","tag-security-posture","tag-work-ethic"],"acf":[],"author_meta":{"display_name":"schuessler","author_link":"https:\/\/www.tarleton.edu\/cob\/author\/schuessler-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2\/"},"featured_img":null,"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/www.tarleton.edu\/cob\/category\/intellectual-contributions\/\" class=\"advgb-post-tax-term\">Intellectual Contributions<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Intellectual Contributions<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/www.tarleton.edu\/cob\/category\/intellectual-contributions\/\" class=\"advgb-post-tax-term\">Employment Screening<\/a>","<a href=\"https:\/\/www.tarleton.edu\/cob\/category\/intellectual-contributions\/\" class=\"advgb-post-tax-term\">Information Security<\/a>","<a href=\"https:\/\/www.tarleton.edu\/cob\/category\/intellectual-contributions\/\" class=\"advgb-post-tax-term\">Security Posture<\/a>","<a href=\"https:\/\/www.tarleton.edu\/cob\/category\/intellectual-contributions\/\" class=\"advgb-post-tax-term\">Work Ethic<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Employment Screening<\/span>","<span class=\"advgb-post-tax-term\">Information Security<\/span>","<span class=\"advgb-post-tax-term\">Security Posture<\/span>","<span class=\"advgb-post-tax-term\">Work Ethic<\/span>"]}},"comment_count":0,"relative_dates":{"created":"Posted 4 years ago","modified":"Updated 2 months ago"},"absolute_dates":{"created":"Posted on May 22, 2022","modified":"Updated on February 10, 2026"},"absolute_dates_time":{"created":"Posted on May 22, 2022 4:02 am","modified":"Updated on February 10, 2026 8:45 pm"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/posts\/3892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/comments?post=3892"}],"version-history":[{"count":2,"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/posts\/3892\/revisions"}],"predecessor-version":[{"id":5101,"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/posts\/3892\/revisions\/5101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/media?parent=3892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/categories?post=3892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tarleton.edu\/cob\/wp-json\/wp\/v2\/tags?post=3892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}