Information Security Policy Compliance: The Role of Information Security Awareness

被引:0
|
作者
AL-Omari, Ahmad [1 ]
El-Gayar, Omar [1 ]
Deokar, Amit [1 ]
机构
[1] Dakota State Univ, Madison, SD 57042 USA
来源
关键词
Information security awareness; compliance; information security policies; technology awareness; theory of planned behavior; SELF-EFFICACY; DETERRENCE; BEHAVIORS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Theory of Planned Behavior, we investigated the role of users' self-learning and knowledge of security issues in shaping their attitudes toward compliance with information security policies (ISPs). We collected data from nine financial organizations to test the proposed research model. Results show that employees' previous knowledge of security issues and technologies have significant positive impact on their attitudes toward compliance with ISPs. This study sheds light on the importance of users' general awareness of security issues and technologies in shaping their attitudes to comply with ISPs.
引用
收藏
页数:10
相关论文
共 50 条
  • [11] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [12] The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7690 - 7695
  • [13] Impact of employees' demographic characteristics on the awareness and compliance of information security policy in organizations
    Chua, Hui Na
    Wong, Siew Fan
    Low, Yeh Ching
    Chang, Younghoon
    TELEMATICS AND INFORMATICS, 2018, 35 (06) : 1770 - 1780
  • [14] The Role of Information Deserts in Information Security Awareness and Behaviour
    Snyman, D. P.
    Kruger, H. A.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 613 - 620
  • [15] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [16] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [17] Information Security Policy Compliance: Leadership and Trust
    Paliszkiewicz, Joanna
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) : 211 - 217
  • [18] Issues and Trends in Information Security Policy Compliance
    Bhaharin, Surayahani Hasnul
    Mokhtar, Umi Asma
    Sulaiman, Rossilawati
    Yusof, Maryati Mohd
    2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS: EMPOWERING DIGITAL INNOVATION (ICRIIS 2019), 2019,
  • [19] Predictors of Success in Information Security Policy Compliance
    Nord, Jeretta
    Sargent, Carol Springer
    Koohang, Alex
    Marotta, Angelica
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (04) : 863 - 873
  • [20] Behavioral Approach to Information Security Policy Compliance
    Mady, Ashraf
    Gupta, Saurabh
    AMCIS 2017 PROCEEDINGS, 2017,