INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED BELIEFS AND INFORMATION SECURITY AWARENESS

被引:2
|
作者
Bulgurcu, Burcu [1 ]
Cavusoglu, Hasan [1 ]
Benbasat, Izak [1 ]
机构
[1] Univ British Columbia, Sauder Sch Business, Vancouver, BC V6T 1Z2, Canada
关键词
Information security awareness; information security management; compliance; information security policy; behavioral issues of information security; theory of planned behavior; SYSTEMS SECURITY; PROTECTION MOTIVATION; PLANNED BEHAVIOR; SELF-EFFICACY; CHOICE; TECHNOLOGY; MANAGEMENT; MODEL; DETERRENCE; PUNISHMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information security rules and regulations of the organization are the key to strengthening information security, understanding compliance behavior is crucial for organizations that want to leverage their human capital. This research identifies the antecedents of employee compliance with the information security policy (ISP) of an organization. Specifically, we investigate the rationality-based factors that drive an employee to comply with requirements of the ISP with regard to protecting the organization's information and technology resources. Drawing on the theory of planned behavior, we posit that, along with normative belief and self-efficacy, an employee's attitude toward compliance determines intention to comply with the ISP. As a key contribution, we posit that an employee's attitude is influenced by benefit of compliance, cost of compliance, and cost of noncompliance, which are beliefs about the overall assessment of consequences of compliance or noncompliance. We then postulate that these beliefs are shaped by the employee's outcome beliefs concerning the events that follow compliance or noncompliance: benefit of compliance is shaped by intrinsic benefit, safety of resources, and rewards, while cost of compliance is shaped by work impediment; and cost of noncompliance is shaped by intrinsic cost, vulnerability of resources, and sanctions. We also investigate the impact of information security awareness (ISA) on outcome beliefs and an employee's attitude toward compliance with the ISP. Our results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply. Outcome beliefs significantly affect beliefs about overall assessment of consequences, and they, in turn, significantly affect an employee's attitude. Furthermore, ISA positively affects both attitude and outcome beliefs. As the importance of employees' following their organizations' information security rules and regulations increases, our study sheds light on the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance.
引用
收藏
页码:523 / 548
页数:26
相关论文
共 50 条
  • [21] Impact of employees' demographic characteristics on the awareness and compliance of information security policy in organizations
    Chua, Hui Na
    Wong, Siew Fan
    Low, Yeh Ching
    Chang, Younghoon
    TELEMATICS AND INFORMATICS, 2018, 35 (06) : 1770 - 1780
  • [22] A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate
    Goo, Jahyun
    Yim, Myung-Seong
    Kim, Dan J.
    IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2014, 57 (04) : 286 - 308
  • [23] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [24] Information security policy compliance: a higher education case study
    Alshare, Khaled A.
    Lane, Peggy L.
    Lane, Michael R.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 91 - 108
  • [25] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [26] Information Security Policy Compliance: Leadership and Trust
    Paliszkiewicz, Joanna
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) : 211 - 217
  • [27] Issues and Trends in Information Security Policy Compliance
    Bhaharin, Surayahani Hasnul
    Mokhtar, Umi Asma
    Sulaiman, Rossilawati
    Yusof, Maryati Mohd
    2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS: EMPOWERING DIGITAL INNOVATION (ICRIIS 2019), 2019,
  • [28] Predictors of Success in Information Security Policy Compliance
    Nord, Jeretta
    Sargent, Carol Springer
    Koohang, Alex
    Marotta, Angelica
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (04) : 863 - 873
  • [29] Behavioral Approach to Information Security Policy Compliance
    Mady, Ashraf
    Gupta, Saurabh
    AMCIS 2017 PROCEEDINGS, 2017,
  • [30] The role of norms in information security policy compliance
    Wiafe, Isaac
    Koranteng, Felix Nti
    Wiafe, Abigail
    Obeng, Emmanuel Nyarko
    Yaokumah, Winfred
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 743 - 761