Information Security Policy Compliance: Systematic Literature Review

被引:13
|
作者
Angraini [1 ,4 ]
Alias, Rose Alinda [2 ]
Okfalisa [3 ]
机构
[1] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu 81310, Malaysia
[2] Univ Teknol Malaysia, Azman Hash Int Business Sch, Dept Informat Syst, Johor Baharu 81310, Malaysia
[3] Univ Islam Negeri Sultan Syarif Kasim, Fac Sci & Technol, Dept Informat Engn, Pekanbaru, Riau, Indonesia
[4] Univ Islam Negeri Sultan Syarif Kasim, Fac Sci & Technol, Dept Informat Syst, Pekanbaru, Riau, Indonesia
关键词
Information security policy; Compliance; Literature review; Evaluation; MODEL; NONCOMPLIANCE;
D O I
10.1016/j.procs.2019.11.235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growth of research in information technology security has enlarged in recent years. Investigations in Information security besides discussing technical problems but also consider policies, behavior and user compliance issues. Therefore, a systematic review is needed to inform the development of research in compliance with information security policies. This literature review aims to find the challenges and explore the current state-of-the art of information security policy compliance. We identified 305 research papers published on topics of information security policy compliance between 2014 and 2019 and extract 53 documents from discussing with inclusion and exclusion criteria. This literature review found there is a lack of study about an evaluation of information security policy compliance using specific metric and need to enhance the model of information security policy compliance with organizational theories. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1216 / 1224
页数:9
相关论文
共 50 条
  • [31] Importance of indexing policy for information units: a systematic review of the literature
    Gomes, Rainner Finelli
    de Lima, Gercina Angela
    EM QUESTAO, 2021, 27 (01): : 210 - +
  • [32] The hunt for computerized support in information security policy management A literature review
    Rostami, Elham
    Karlsson, Fredrik
    Kolkowska, Ella
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (02) : 215 - 259
  • [33] The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7690 - 7695
  • [34] A systematic literature review of cybersecurity scales assessing information security awareness
    Rohan, Rohani
    Pal, Debajyoti
    Hautamaki, Jari
    Funilkul, Suree
    Chutimaskul, Wichian
    Thapliyal, Himanshu
    HELIYON, 2023, 9 (03)
  • [35] Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review
    Shojaei, Parisasadat
    Vlahu-Gjorgievska, Elena
    Chow, Yang-Wai
    COMPUTERS, 2024, 13 (02)
  • [36] A Systematic Literature Review of Crowdsourcing-Based Research in Information Security
    Sauerwein, Clemens
    Gander, Matthias
    Felderer, Michael
    Breu, Ruth
    PROCEEDINGS 2016 IEEE SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING SOSE 2016, 2016, : 365 - +
  • [37] Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review
    Anti, Emmanuel
    Vartiainen, Tero
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2024, 55 : 1 - 36
  • [38] The impact of information security events to the stock market: A systematic literature review
    Spanos, Georgios
    Angelis, Lefteris
    COMPUTERS & SECURITY, 2016, 58 : 216 - 229
  • [39] Dual Routes of Training on Information Security Policy Compliance
    Chen, Qiuyu
    Hong, Yuxiang
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [40] An Integrative Behavioral Model of Information Security Policy Compliance
    Kim, Sang Hoon
    Yang, Kyung Hoon
    Park, Sunyoung
    SCIENTIFIC WORLD JOURNAL, 2014,