A Composite Framework for Behavioral Compliance with Information Security Policies
@article{Aurigemma2012ACF, title={A Composite Framework for Behavioral Compliance with Information Security Policies}, author={Salvatore Aurigemma}, journal={2012 45th Hawaii International Conference on System Sciences}, year={2012}, pages={3248-3257} }
To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned benefits, a composite model is…
72 Citations
Motivating Employees to Comply with Information Security Policies
- Computer Science
- 2016
This theoretical model provides a framework for how organizations can intrinsically motivate their employees to comply with organizational information security policies through a supportive organizational culture, training, and job design.
Factors Influencing Information Security Policy Compliance Behavior
- Computer ScienceModern Theories and Practices for Cyber Ethics and Security Compliance
- 2020
Results from the study show that security education training and awareness, top-management's commitment for information security, and peer non-compliance behavior affect the information security climate in an organization.
Factors Influencing Information Security Policy Compliance Behavior
- Business2019 International Conference on Cyber Security and Internet of Things (ICSIoT)
- 2019
The model results showed that perceived threat, vulnerability, response cost, and efficiency had a significant effect on compliance but interestingly not for Self-Efficacy.
A Self-Regulatory Approach to Behavioral Compliance with IS Security Policies – “Come on, Baby, do the Locomotion”
- Computer Science
- 2014
The theory of self-regulation and the theory ofSelf-determination are introduced to identify what factors cause some individuals to maintain compliance with security policies and others not, and what roles motivation and organizational reward and punishment structures play in the initiation and retention of security compliance behavior.
A Composite Framework to Promote Information Security Policy Compliance in Organizations
- Computer Science
- 2019
The paper synthesizes the existing literature and groups relevant ISP compliance factors into user involvement, personality types, security awareness and training, behavioral factors, and information security culture to develop a composite ISP compliance framework that proposes the establishment of ISP compliance as a culture in organizations.
Need for Compliance With Information Security Policy In Universities: a Preliminary survey
- Computer Science2019 Fourth International Conference on Informatics and Computing (ICIC)
- 2019
This research founded management realized the importance of compliance with information security policies to reduce information security incidents and need appropriate model to evaluate information security policy compliance.
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
- Computer ScienceICISDM '17
- 2017
An enhanced conceptual framework of ISP compliance behavior is discussed by addressing ISC as a multidimensional concept which consist of seven comprehensive dimensions which are aligned with the widely accepted concept of organizational culture and ISC.
A Thematic Review of User Compliance with Information Security Policies Literature
- Computer Science
- 2013
For over two decades, the information systems research community has published a sizable body of research on user compliance with information security policies, which has been divided into three categories: conceptual principles or studies without theoretical basis, theoretical models without empirical support; and empirical support grounded upon theories.
HOW EMPLOYEES INTEND TO CONTINUE COMPLYING WITH INFORMATION SYSTEMS' SECURITY POLICIES: INSIGHTS FROM INFORMATION SYSTEMS' CONTINUANCE MODEL
- Computer Science, Business
- 2014
Analysis of data collected from 270 employees in banking organizations shows that employees’ perceived satisfaction and perceived usefulness directly influence continuance intention to comply with IS security policies.
Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives
- Computer ScienceHICSS
- 2017
The study proposes a research model to explain individuals’ intention to reinforce their InfoSec protection and empirically validates the proposed model to provide a deeper understanding of the relationships among risk propensity, self-efficacy, risk perception, Info Sec protection efforts, and InfoSec reinforcement intention.
References
SHOWING 1-10 OF 92 REFERENCES
Security Policy Compliance: User Acceptance Perspective
- Computer Science, Business2012 45th Hawaii International Conference on System Sciences
- 2012
The study is the first to address compliance intention from a users' perspective and indicates strong support for the proposed instrument and represents an early confirmation for the validation of the underlying theoretical model.
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
- Computer ScienceMIS Q.
- 2010
This article shows that neutralization theory, a theory prominent in Criminology but not yet applied in the context of IS, provides a compelling explanation for IS security policy violations and offers new insight into how employees rationalize this behavior.
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- BusinessMIS Q.
- 2010
The results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply, and the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance is shed.
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
- Computer ScienceDecis. Support Syst.
- 2009
Impact of perceived technical protection on security behaviors
- BusinessInf. Manag. Comput. Secur.
- 2009
Perceived technical protection affects behavioral intentions both indirectly, through PBC, and directly, and suggests possible risk compensation effects in the information security context.
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
- BusinessComput. Secur.
- 2012
Protection motivation and deterrence: a framework for security policy compliance in organisations
- Business, Computer ScienceEur. J. Inf. Syst.
- 2009
An Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todd's Decomposed Theory of Planned Behaviour is developed and it is found that employees in the sample underestimate the probability of security breaches.
Self-efficacy in information security: Its influence on end users' information security practice behavior
- Computer ScienceComput. Secur.
- 2009
Employees' Behavior towards IS Security Policy Compliance
- Computer Science, Political Science2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
- 2007
A theoretical model that contains the factors that explain employees' IS security policy compliance is proposed and suggests that information quality has a significant effect on actual IS security Policy compliance.
Security lapses and the omission of information security measures: A threat control model and empirical test
- Computer ScienceComput. Hum. Behav.
- 2008