Universal and Culture-dependent Employee Compliance of Information Systems Security Procedures

被引:11
|
作者
Karjalainen, Mari [1 ]
Siponen, Mikko [2 ]
Puhakainen, Petri [3 ]
Sarker, Suprateek [4 ]
机构
[1] Univ Oulu, Fac Informat Technol & Elect Engn, Oulu, Finland
[2] Univ Jyvaskyla, Res Fac Informat Technol, Jyvaskyla, Finland
[3] Prime Ministers Off, Helsinki, Finland
[4] Univ Virginia, McIntire Sch Commerce, Charlottesville, VA 22904 USA
基金
芬兰科学院;
关键词
Information systems security behavior; national culture; qualitative study; CYBERSECURITY ISSUES; VALUES; IMPACT; TECHNOLOGIES; BEHAVIORS; STYLES; US;
D O I
10.1080/1097198X.2019.1701355
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Employee information systems security behavior (ISSB) is a key concern for organizations. Previous studies have proposed models aimed at explaining employees' ISSB and related behavioral change. While these studies have contributed to our understanding of the reasons for ISSB (change), there is a lack of research related to cultural differences and distinguishing cultural-specific reasons for ISSB. This paper takes the first step in addressing this research gap by theorizing about employee ISSB based on empirical material collected in Finland, Switzerland, the UAE, and China. This paper suggests that ISSB constitute a learned information systems security (ISS) conventions that may be somewhat generic across different cultures; however, different paradigms of learning seem to be effective in different cultures for supporting behavioral change. From a theoretical perspective, the results help us to understand why employees comply or do not comply with ISS procedures. This study also highlights the need for future research on employee compliance to understand cultural differences regarding key ISS interventions. Finally, from a managerial perspective, the theory suggests that different cultures require different ISS interventions.
引用
收藏
页码:5 / 24
页数:20
相关论文
共 50 条
  • [31] Security Culture and Security Awareness as the Basic Factors for Security Effectiveness in Health Information Systems
    Shahri, Ahmad Bakhtiyari
    Ismail, Zuraini
    Rahim, Nor Zairah Ab.
    JURNAL TEKNOLOGI, 2013, 64 (02):
  • [32] Emergent Needs in Assuring Security-Relevant Compliance of Information Systems
    Momcilovic, Tomas Bueno
    Balta, Dian
    PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024, 2024, : 46 - 49
  • [33] Leadership of Information Security Managers on the Effectiveness of Information Systems Security Through Mediate of Organizational Culture
    Choi, Myeonggil
    Song, Jeongsuk
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 649 - 654
  • [34] Examining the effects of cognitive load on information systems security policy compliance
    Ganye, Derrick
    Smith, Kane
    INTERNET RESEARCH, 2025, 35 (01) : 380 - 418
  • [35] CYBER SECURITY FOUNDATIONS FOR COMPLIANCE WITHIN GDPR FOR BUSINESS INFORMATION SYSTEMS
    Boban, Marija
    ECONOMIC AND SOCIAL DEVELOPMENT (ESD 2018): 35TH INTERNATIONAL SCIENTIFIC CONFERENCE, 2018, : 541 - 553
  • [36] Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
    Chen, Yan
    Galletta, Dennis F.
    Lowry, Paul Benjamin
    Luo, Xin
    Moody, Gregory D.
    Willison, Robert
    INFORMATION SYSTEMS RESEARCH, 2021, 32 (03) : 1043 - 1065
  • [37] The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation
    Lee, Daeun
    Lallie, Harjinder Singh
    Michaelides, Nadine
    COGNITION TECHNOLOGY & WORK, 2023, 25 (2-3) : 273 - 289
  • [38] Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes
    Johnston, Allen C.
    Wech, Barbara
    Jack, Eric
    Beavers, Micah
    AMCIS 2010 PROCEEDINGS, 2010,
  • [39] The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation
    Daeun Lee
    Harjinder Singh Lallie
    Nadine Michaelides
    Cognition, Technology & Work, 2023, 25 : 273 - 289
  • [40] NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS
    Siponen, Mikko
    Vance, Anthony
    MIS QUARTERLY, 2010, 34 (03) : 487 - 502