Information Security Policy Compliance: The Role of Information Security Awareness

被引:0
|
作者
AL-Omari, Ahmad [1 ]
El-Gayar, Omar [1 ]
Deokar, Amit [1 ]
机构
[1] Dakota State Univ, Madison, SD 57042 USA
来源
关键词
Information security awareness; compliance; information security policies; technology awareness; theory of planned behavior; SELF-EFFICACY; DETERRENCE; BEHAVIORS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Theory of Planned Behavior, we investigated the role of users' self-learning and knowledge of security issues in shaping their attitudes toward compliance with information security policies (ISPs). We collected data from nine financial organizations to test the proposed research model. Results show that employees' previous knowledge of security issues and technologies have significant positive impact on their attitudes toward compliance with ISPs. This study sheds light on the importance of users' general awareness of security issues and technologies in shaping their attitudes to comply with ISPs.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [32] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [33] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [34] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [35] Information Security Service Branding - beyond information security awareness
    Rastogi, Rahul
    von Solms, Rossouw
    IMSCI'11: THE 5TH INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 55 - 60
  • [36] Information security policy compliance: a replication study in Ethiopia
    Aebissa, Berhanu
    Dhillon, Gurpreet
    Meshesha, Million
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [37] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [38] Promoting Information Security Policy Compliance - An Empirical Study
    Li, Lei
    Han, Meng
    AMCIS 2020 PROCEEDINGS, 2020,
  • [39] Understanding Employee Information Security Policy Compliance from Role Theory Perspective
    Nasirpouri Shadbad, Forough
    Biros, David
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2021, 61 (06) : 571 - 580
  • [40] Peers matter: The moderating role of social influence on information security policy compliance
    Yazdanmehr, Adel
    Wang, Jingguo
    Yang, Zhiyong
    INFORMATION SYSTEMS JOURNAL, 2020, 30 (05) : 791 - 844