Reducing fraud in organizations through information security policy compliance: An information security controls perspective

被引:1
|
作者
Brown, Dennis [1 ]
Batra, Gunjan [1 ]
Zafar, Humayun [1 ]
Saeed, Khawaja [1 ]
机构
[1] Kennesaw State Univ, Kennesaw, GA 30144 USA
关键词
Information security control proficiency; Information security policy quality; Information security; Enforcement; Computer based occupational fraud; Information security policy compliance; PROTECTION MOTIVATION; SYSTEMS SECURITY; BEHAVIORAL-RESEARCH; FEAR APPEALS; DETERRENCE; MANAGEMENT; NEUTRALIZATION; INTENTIONS; AWARENESS; INSIGHTS;
D O I
10.1016/j.cose.2024.103958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more business processes and information assets are digitized, computer resources are increasingly being misused to perpetrate fraudulent activities. Research shows that fraud committed by (or with) trusted insiders (called occupational fraud or internal organizational fraud) is responsible for significantly more damage than that committed by external actors (for example, cyber fraud). Current fraud research has primarily focused on the person perpetuating the fraud instead of the internal mechanisms organizations can employ in reducing fraud. The study examines the relationship between compliance with organizations' technology controls (primarily focused on information security) and its impact on computer-based occupational fraud. Based on general deterrence and fraud triangle theories, the study proposes information security control proficiency (ISCP) modeled as an integration of the quality of information security policy and its enforcement as a key factor that influences information security policy compliance. We further postulate that compliance with information security policy mediates the relationship between information security control proficiency and computer-basedoccupational fraud. Empirical assessment supports the structure of the information security control proficiency construct. Model testing shows that information security control proficiency positively impacts information security policy compliance, which further deters the use of a company's computer systems and resources to conduct fraudulent activities. Thus, if an organization establishes high-quality information security policies and supports the policies with effective enforcement, it correspondingly leads to better compliance. Furthermore, less fraud is committed when compliance with information security controls is high. We offer various managerial implications and future research extension ideas.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] IS professionals' information security behaviors in Chinese IT organizations for information security protection
    Ma, Xiaofen
    INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (01)
  • [42] Fraud Threats Disclosure through Cloud Information Security Framework
    Mavroeidakos, Theodoros
    Vergados, Dimitrios D.
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2017, : 328 - 333
  • [43] Information security policy
    Mead, N
    Anderson, R
    McGraw, G
    Machanick, P
    Bollinger, T
    Shimeall, T
    Pyster, A
    Brown, D
    Draier, E
    Schmidt, H
    IEEE SOFTWARE, 2000, 17 (05) : 26 - 32
  • [44] From trusted information security controls to a trusted information security environment
    Von Solms, R
    Van De Haar, H
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 29 - 36
  • [45] Impact of Security-related Stress and Affective Distress on Information Security Policy Compliance
    Bao Quoc Duong
    AMCIS 2020 PROCEEDINGS, 2020,
  • [46] Information security policy compliance: a higher education case study
    Alshare, Khaled A.
    Lane, Peggy L.
    Lane, Michael R.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 91 - 108
  • [47] Information Security Policy Compliance: An Empirical Study of Ethical Ideology
    Al-Omari, Ahmad
    Deokar, Amit
    El-Gayar, Omar
    Walters, Jack
    Aleassa, Hasan
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3018 - 3027
  • [48] Designing an incentive mechanism for information security policy compliance: An experiment
    Li, Yuanxiang John
    Hoffman, Elizabeth
    JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 2023, 212 : 138 - 159
  • [49] Religiosity and Information Security Policy Compliance Completed Research Paper
    Borena, Berhanu
    Belanger, France
    AMCIS 2013 PROCEEDINGS, 2013,
  • [50] Technostress and its influence on employee information security policy compliance
    Nasirpouri Shadbad, Forough
    Biros, David
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (01) : 119 - 141