Reducing fraud in organizations through information security policy compliance: An information security controls perspective

被引:1
|
作者
Brown, Dennis [1 ]
Batra, Gunjan [1 ]
Zafar, Humayun [1 ]
Saeed, Khawaja [1 ]
机构
[1] Kennesaw State Univ, Kennesaw, GA 30144 USA
关键词
Information security control proficiency; Information security policy quality; Information security; Enforcement; Computer based occupational fraud; Information security policy compliance; PROTECTION MOTIVATION; SYSTEMS SECURITY; BEHAVIORAL-RESEARCH; FEAR APPEALS; DETERRENCE; MANAGEMENT; NEUTRALIZATION; INTENTIONS; AWARENESS; INSIGHTS;
D O I
10.1016/j.cose.2024.103958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more business processes and information assets are digitized, computer resources are increasingly being misused to perpetrate fraudulent activities. Research shows that fraud committed by (or with) trusted insiders (called occupational fraud or internal organizational fraud) is responsible for significantly more damage than that committed by external actors (for example, cyber fraud). Current fraud research has primarily focused on the person perpetuating the fraud instead of the internal mechanisms organizations can employ in reducing fraud. The study examines the relationship between compliance with organizations' technology controls (primarily focused on information security) and its impact on computer-based occupational fraud. Based on general deterrence and fraud triangle theories, the study proposes information security control proficiency (ISCP) modeled as an integration of the quality of information security policy and its enforcement as a key factor that influences information security policy compliance. We further postulate that compliance with information security policy mediates the relationship between information security control proficiency and computer-basedoccupational fraud. Empirical assessment supports the structure of the information security control proficiency construct. Model testing shows that information security control proficiency positively impacts information security policy compliance, which further deters the use of a company's computer systems and resources to conduct fraudulent activities. Thus, if an organization establishes high-quality information security policies and supports the policies with effective enforcement, it correspondingly leads to better compliance. Furthermore, less fraud is committed when compliance with information security controls is high. We offer various managerial implications and future research extension ideas.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [2] Information Security Compliance in Organizations: An Institutional Perspective
    AlKalbani A.
    Deng H.
    Kam B.
    Zhang X.
    Data and Information Management, 2017, 1 (02) : 104 - 114
  • [3] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [4] Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud
    Brown, Dennis
    Zafar, Humayun
    AMCIS 2017 PROCEEDINGS, 2017,
  • [5] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [6] Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
    Chen, Yan
    Ramamurthy, K.
    Wen, Kuang-Wei
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) : 157 - 188
  • [7] Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance
    Park, Minjung
    Chai, Sangmi
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4723 - 4731
  • [8] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [9] Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective
    Al Nuaim, Abdullah
    Ramirez, Ronald
    Dincelli, Ersin
    AMCIS 2020 PROCEEDINGS, 2020,
  • [10] Employees' information security policy compliance: A norm activation perspective
    Yazdanmehr, Adel
    Wang, Jingguo
    DECISION SUPPORT SYSTEMS, 2016, 92 : 36 - 46