Improving employees' compliance through information systems security training: An action research study

被引:0
|
作者
Puhakainen P. [1 ]
Siponen M. [1 ]
机构
[1] IS Security Research Center, Department of Information Processing, Science University of Oulu, Oulu
来源
关键词
Employees' compliance with security policies; IS security; IS security training;
D O I
10.2307/25750704
中图分类号
学科分类号
摘要
Employee noncompliance with information systems security policies is a key concern for organizations. If users do not comply with IS security policies, security solutions lose their efficacy. Of the different IS security policy compliance approaches, training is the most commonly suggested in the literature. Yet, few of the existing studies about training to promote IS policy compliance utilize theory to explain what learning principles affect user compliance with IS security policies, or offer empirical evidence of their practical effec-tiveness. Consequently, there is a need for IS security training approaches that are theory-based and empirically evaluated. Accordingly, we propose a training program based on two theories: the universal constructive instructional theory and the elaboration likelihood model. We then validate the training program for IS security policy compliance training through an action research project. The action research intervention suggests that the theory-based training achieved positive results and was practical to deploy. Moreover, the intervention suggests that information security training should utilize contents and methods that activate and motivate the learners to systematic cognitive processing of information they receive during the training. In addition, the action research study made clear that a continuous communication process was also required to improve user IS security policy compliance. The findings of this study offer new insights for scholars and practitioners involved in IS security policy compliance.
引用
收藏
页码:757 / 778
页数:21
相关论文
共 50 条
  • [1] IMPROVING EMPLOYEES' COMPLIANCE THROUGH INFORMATION SYSTEMS SECURITY TRAINING: AN ACTION RESEARCH STUDY
    Puhakainen, Petri
    Siponen, Mikko
    MIS QUARTERLY, 2010, 34 (04) : 757 - 778
  • [2] Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study
    Inaba, Midori
    Terada, Takeaki
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 335 - 340
  • [3] Readability as lever for employees' compliance with information security policies
    Ammann, Franz-Emst
    Sowa, Aleksandra
    ISACA Journal, 2013, 4 : 39 - 42
  • [4] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [5] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [6] Implementation of an Information Systems Security Policy: Action Research
    Lopes, Isabel
    Oliveira, Pedro
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON RESEARCH METHODOLOGY FOR BUSINESS AND MANAGEMENT STUDIES (ECRM 2014), 2014, : 244 - 252
  • [7] A study of compliance management in information systems research
    University of Queensland, 4072 Brisbane, Australia
    Eur. Conf. Inf. Syst., ECIS, 1600,
  • [8] Employees' information security policy compliance: A norm activation perspective
    Yazdanmehr, Adel
    Wang, Jingguo
    DECISION SUPPORT SYSTEMS, 2016, 92 : 36 - 46
  • [9] Information Security Policies Compliance among Employees in Cybersecurity Malaysia
    Kadir, Mohd Razilan Abdul
    Norman, Sharifah Norwahidah Syed
    Rahman, Safawi Abdul
    Ahmad, Abdul Rahman
    Bunawan, Ap-Azli
    VISION 2020: INNOVATION MANAGEMENT, DEVELOPMENT SUSTAINABILITY, AND COMPETITIVE ECONOMIC GROWTH, 2016, VOLS I - VII, 2016, : 2419 - 2430
  • [10] The effect of perceived organizational culture on employees' information security compliance
    Karlsson, Martin
    Karlsson, Fredrik
    Astrom, Joachim
    Denk, Thomas
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 382 - 401