Information Security Policy Compliance: Systematic Literature Review

被引:13
|
作者
Angraini [1 ,4 ]
Alias, Rose Alinda [2 ]
Okfalisa [3 ]
机构
[1] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu 81310, Malaysia
[2] Univ Teknol Malaysia, Azman Hash Int Business Sch, Dept Informat Syst, Johor Baharu 81310, Malaysia
[3] Univ Islam Negeri Sultan Syarif Kasim, Fac Sci & Technol, Dept Informat Engn, Pekanbaru, Riau, Indonesia
[4] Univ Islam Negeri Sultan Syarif Kasim, Fac Sci & Technol, Dept Informat Syst, Pekanbaru, Riau, Indonesia
关键词
Information security policy; Compliance; Literature review; Evaluation; MODEL; NONCOMPLIANCE;
D O I
10.1016/j.procs.2019.11.235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growth of research in information technology security has enlarged in recent years. Investigations in Information security besides discussing technical problems but also consider policies, behavior and user compliance issues. Therefore, a systematic review is needed to inform the development of research in compliance with information security policies. This literature review aims to find the challenges and explore the current state-of-the art of information security policy compliance. We identified 305 research papers published on topics of information security policy compliance between 2014 and 2019 and extract 53 documents from discussing with inclusion and exclusion criteria. This literature review found there is a lack of study about an evaluation of information security policy compliance using specific metric and need to enhance the model of information security policy compliance with organizational theories. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1216 / 1224
页数:9
相关论文
共 50 条
  • [21] Psychological Capital and Information Security Policy Compliance
    Zhao, Jiaqing
    Hong, Yuxiang
    Chen, Wenqing
    Chen, Chouyong
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [22] Systematic Literature Review: Information security behaviour on smartphone users
    Dawie, Ferdinand Jilan
    Masrek, Mohamad Noorman
    Rahman, Safawi Abdul
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2022, 7 : 275 - 281
  • [23] Information and cyber security maturity models: a systematic literature review
    Rabii, Anass
    Assoul, Saliha
    Ouazzani Touhami, Khadija
    Roudies, Ounsa
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 627 - 644
  • [24] Economic valuation for information security investment: a systematic literature review
    Schatz, Daniel
    Bashroush, Rabih
    INFORMATION SYSTEMS FRONTIERS, 2017, 19 (05) : 1205 - 1228
  • [25] Inter-organisational information security: a systematic literature review
    Karlsson, Fredrik
    Kolkowska, Ella
    Prenkert, Frans
    INFORMATION AND COMPUTER SECURITY, 2016, 24 (05) : 418 - 451
  • [26] Economic valuation for information security investment: a systematic literature review
    Daniel Schatz
    Rabih Bashroush
    Information Systems Frontiers, 2017, 19 : 1205 - 1228
  • [27] Benefits and Challenges in Information Security Certification - A Systematic Literature Review
    Hulshof, Mike
    Daneva, Maya
    BUSINESS MODELING AND SOFTWARE DESIGN (BMSD 2021), 2021, 422 : 154 - 169
  • [28] Seeing the forest and the trees: A meta-analysis of information security policy compliance literature
    Cram, W. Alec
    Proudfoot, Jeffrey G.
    D'Arcy, John
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 4051 - 4060
  • [29] Cyber-Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review
    Sulaiman, Noor Suhani
    Fauzi, Muhammad Ashraf
    Wider, Walton
    Rajadurai, Jegatheesan
    Hussain, Suhaidah
    Harun, Siti Aminah
    SOCIAL SCIENCES-BASEL, 2022, 11 (09):
  • [30] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602