Reducing fraud in organizations through information security policy compliance: An information security controls perspective

被引:1
|
作者
Brown, Dennis [1 ]
Batra, Gunjan [1 ]
Zafar, Humayun [1 ]
Saeed, Khawaja [1 ]
机构
[1] Kennesaw State Univ, Kennesaw, GA 30144 USA
关键词
Information security control proficiency; Information security policy quality; Information security; Enforcement; Computer based occupational fraud; Information security policy compliance; PROTECTION MOTIVATION; SYSTEMS SECURITY; BEHAVIORAL-RESEARCH; FEAR APPEALS; DETERRENCE; MANAGEMENT; NEUTRALIZATION; INTENTIONS; AWARENESS; INSIGHTS;
D O I
10.1016/j.cose.2024.103958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more business processes and information assets are digitized, computer resources are increasingly being misused to perpetrate fraudulent activities. Research shows that fraud committed by (or with) trusted insiders (called occupational fraud or internal organizational fraud) is responsible for significantly more damage than that committed by external actors (for example, cyber fraud). Current fraud research has primarily focused on the person perpetuating the fraud instead of the internal mechanisms organizations can employ in reducing fraud. The study examines the relationship between compliance with organizations' technology controls (primarily focused on information security) and its impact on computer-based occupational fraud. Based on general deterrence and fraud triangle theories, the study proposes information security control proficiency (ISCP) modeled as an integration of the quality of information security policy and its enforcement as a key factor that influences information security policy compliance. We further postulate that compliance with information security policy mediates the relationship between information security control proficiency and computer-basedoccupational fraud. Empirical assessment supports the structure of the information security control proficiency construct. Model testing shows that information security control proficiency positively impacts information security policy compliance, which further deters the use of a company's computer systems and resources to conduct fraudulent activities. Thus, if an organization establishes high-quality information security policies and supports the policies with effective enforcement, it correspondingly leads to better compliance. Furthermore, less fraud is committed when compliance with information security controls is high. We offer various managerial implications and future research extension ideas.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [32] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [33] Information security policy compliance: a replication study in Ethiopia
    Aebissa, Berhanu
    Dhillon, Gurpreet
    Meshesha, Million
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [34] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [35] Promoting Information Security Policy Compliance - An Empirical Study
    Li, Lei
    Han, Meng
    AMCIS 2020 PROCEEDINGS, 2020,
  • [36] INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED BELIEFS AND INFORMATION SECURITY AWARENESS
    Bulgurcu, Burcu
    Cavusoglu, Hasan
    Benbasat, Izak
    MIS QUARTERLY, 2010, 34 (03) : 523 - 548
  • [37] Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    Bulgurcu B.
    Cavusoglu H.
    Benbasat I.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 523 - 548
  • [38] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [39] An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective
    Han, JinYoung
    Kim, Yoo Jung
    Kim, Hyungjin
    COMPUTERS & SECURITY, 2017, 66 : 52 - 65
  • [40] Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective
    Bansal, Gaurav
    Shin, Soo Il
    AMCIS 2016 PROCEEDINGS, 2016,