Information Security Policy Compliance: Systematic Literature Review

被引:13
|
作者
Angraini [1 ,4 ]
Alias, Rose Alinda [2 ]
Okfalisa [3 ]
机构
[1] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu 81310, Malaysia
[2] Univ Teknol Malaysia, Azman Hash Int Business Sch, Dept Informat Syst, Johor Baharu 81310, Malaysia
[3] Univ Islam Negeri Sultan Syarif Kasim, Fac Sci & Technol, Dept Informat Engn, Pekanbaru, Riau, Indonesia
[4] Univ Islam Negeri Sultan Syarif Kasim, Fac Sci & Technol, Dept Informat Syst, Pekanbaru, Riau, Indonesia
关键词
Information security policy; Compliance; Literature review; Evaluation; MODEL; NONCOMPLIANCE;
D O I
10.1016/j.procs.2019.11.235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growth of research in information technology security has enlarged in recent years. Investigations in Information security besides discussing technical problems but also consider policies, behavior and user compliance issues. Therefore, a systematic review is needed to inform the development of research in compliance with information security policies. This literature review aims to find the challenges and explore the current state-of-the art of information security policy compliance. We identified 305 research papers published on topics of information security policy compliance between 2014 and 2019 and extract 53 documents from discussing with inclusion and exclusion criteria. This literature review found there is a lack of study about an evaluation of information security policy compliance using specific metric and need to enhance the model of information security policy compliance with organizational theories. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1216 / 1224
页数:9
相关论文
共 50 条
  • [41] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [42] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [43] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [44] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [45] Information security policy compliance: a replication study in Ethiopia
    Aebissa, Berhanu
    Dhillon, Gurpreet
    Meshesha, Million
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [46] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [47] Promoting Information Security Policy Compliance - An Empirical Study
    Li, Lei
    Han, Meng
    AMCIS 2020 PROCEEDINGS, 2020,
  • [48] Compliance with bring your own device security policies in organizations: A systematic literature review
    Palanisamy, Rathika
    Norman, Azah Anir
    Kiah, Miss Laiha Mat
    COMPUTERS & SECURITY, 2020, 98 (98)
  • [49] Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective
    Al Nuaim, Abdullah
    Ramirez, Ronald
    Dincelli, Ersin
    AMCIS 2020 PROCEEDINGS, 2020,
  • [50] Information Security Policy Compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
    Alzahrani, Ahmed
    Johnson, Chris
    Altamimi, Saad
    2018 4TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2018), 2018, : 125 - 132