Skip to main content
. 2022 Nov 30;19(23):16038. doi: 10.3390/ijerph192316038
Serial No. Title Items Likert Scale of 5 Levels
1 2 3 4 5
1 If I copy some of my company’s confidential data to unencrypted portable media (such as a USB drive), it can create serious information security problems for my company.
2 If I do not comply with the information security system, the company I work for will face serious information security problems.
3 For me, the loss of data privacy by not complying with the information security system is a serious issue.
4 The work computer was invaded by a virus and the company’s information security system requires contacting a professional to remove the virus. If I choose to solve the virus problem myself, I can save my work time.
5 The company’s information security system prohibits copying this data to unencrypted portable media (e.g., USB drives), and it saves me time at work if I copy the data to a USB drive to facilitate analysis of the data during a business trip.
6 Failure to comply with the information security system saves time on the job.
7 If I do not comply with the information security system, I may be exposed to information security threats.
8 If I do not follow the information security system, the company I work for may have information security problems.
9 The company’s information security system states that passwords are not to be shared, and if I share my password with a colleague, there may be information security issues.
10 Compliance with the information security system can reduce the probability of information system security problems.
11 Comply with the information security system, and there will be few information system security problems.
12 Compliance with the information security system can prevent security breaches in the company’s information system.
13 It is easy for me to comply with the information security system established by the company.
14 I am able to consciously comply with the information security system.
15 Compliance with the information security system inconveniences my daily work.
16 Compliance with the information security system incurs associated administrative costs.
17 Complying with the information security system not only takes time but also requires a lot of effort.
18 Compliance with information security systems can be a waste of work time.
The following six items are situational questions. In the following scenarios, choose whether you agree with what the people in the scenario are doing on the 5-point scale below.
19 Ming walks to the shared office printer alone and sees a document printed by someone else. The document is marked as “confidential”. The information security system prohibits reading confidential information, but Ming is curious and chooses to read the document. Do you agree with Ming’s action?
20 Jun is browsing a website that may be problematic at work when an anti-virus program alerts him that his computer has been invaded by a virus. Although the information security system requires contacting a professional to remove the virus, Jun chooses to solve the virus problem himself for convenience. Do you agree with Jun’s approach?
21 Li takes her work laptop home to work. Her children want to use the laptop to play games. Although her company’s information security system prohibits sharing the work computer with anyone. However, Li gives the laptop to her children to use. Do you agree with what Li is doing?
22 Le is working in a position that requires him to know the personnel details of the company. His company’s information security system prohibits copying this data to unencrypted portable media (such as a USB drive). However, Le is on a business trip and he wants to analyze the personnel data during the trip, so he chooses to copy this data to his own portable USB drive. Do you agree with Le’s approach?
23 The information security system at Hong’s company requires all users to lock their computers every time they leave them. Hong’s supervisor asks Xiaohong to unlock her computer before she leaves so that other employees can use it. So Hong unlocks the computer before she leaves. Do you agree with Hong’s approach?
24 Kai uses a file server at work, which he can access by entering a password. His company’s information security system states that passwords are not to be shared. Kai is on a business trip and one of his colleagues needs the files on the file server. So Kai tells his colleague the password. Do you agree with Kai’s approach?