Reducing fraud in organizations through information security policy compliance: An information security controls perspective

被引:1
|
作者
Brown, Dennis [1 ]
Batra, Gunjan [1 ]
Zafar, Humayun [1 ]
Saeed, Khawaja [1 ]
机构
[1] Kennesaw State Univ, Kennesaw, GA 30144 USA
关键词
Information security control proficiency; Information security policy quality; Information security; Enforcement; Computer based occupational fraud; Information security policy compliance; PROTECTION MOTIVATION; SYSTEMS SECURITY; BEHAVIORAL-RESEARCH; FEAR APPEALS; DETERRENCE; MANAGEMENT; NEUTRALIZATION; INTENTIONS; AWARENESS; INSIGHTS;
D O I
10.1016/j.cose.2024.103958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more business processes and information assets are digitized, computer resources are increasingly being misused to perpetrate fraudulent activities. Research shows that fraud committed by (or with) trusted insiders (called occupational fraud or internal organizational fraud) is responsible for significantly more damage than that committed by external actors (for example, cyber fraud). Current fraud research has primarily focused on the person perpetuating the fraud instead of the internal mechanisms organizations can employ in reducing fraud. The study examines the relationship between compliance with organizations' technology controls (primarily focused on information security) and its impact on computer-based occupational fraud. Based on general deterrence and fraud triangle theories, the study proposes information security control proficiency (ISCP) modeled as an integration of the quality of information security policy and its enforcement as a key factor that influences information security policy compliance. We further postulate that compliance with information security policy mediates the relationship between information security control proficiency and computer-basedoccupational fraud. Empirical assessment supports the structure of the information security control proficiency construct. Model testing shows that information security control proficiency positively impacts information security policy compliance, which further deters the use of a company's computer systems and resources to conduct fraudulent activities. Thus, if an organization establishes high-quality information security policies and supports the policies with effective enforcement, it correspondingly leads to better compliance. Furthermore, less fraud is committed when compliance with information security controls is high. We offer various managerial implications and future research extension ideas.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] The role of norms in information security policy compliance
    Wiafe, Isaac
    Koranteng, Felix Nti
    Wiafe, Abigail
    Obeng, Emmanuel Nyarko
    Yaokumah, Winfred
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 743 - 761
  • [22] Psychological Capital and Information Security Policy Compliance
    Zhao, Jiaqing
    Hong, Yuxiang
    Chen, Wenqing
    Chen, Chouyong
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [23] The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions
    Chen, Lin
    Xie, Zongxiao
    Zhen, Jie
    Dong, Kunxiang
    PSYCHOLOGY RESEARCH AND BEHAVIOR MANAGEMENT, 2022, 15 : 1177 - 1191
  • [24] INFORMATION SECURITY IN ORGANIZATIONS
    Cirnu, Doris
    Banta, Victor
    METALURGIA INTERNATIONAL, 2013, 18 (03): : 227 - 231
  • [25] Understanding Employee Information Security Policy Compliance from Role Theory Perspective
    Nasirpouri Shadbad, Forough
    Biros, David
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2021, 61 (06) : 571 - 580
  • [26] Information Systems Security Training in Organizations: Andragogical Perspective
    Offor, Patrick I.
    Tejay, Gurvirender
    AMCIS 2014 PROCEEDINGS, 2014,
  • [27] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [28] Dual Routes of Training on Information Security Policy Compliance
    Chen, Qiuyu
    Hong, Yuxiang
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [29] An Integrative Behavioral Model of Information Security Policy Compliance
    Kim, Sang Hoon
    Yang, Kyung Hoon
    Park, Sunyoung
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [30] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353