Employees' adherence to information security policies: An exploratory field study

@article{Siponen2014EmployeesAT,
  title={Employees' adherence to information security policies: An exploratory field study},
  author={Mikko T. Siponen and Mo Adam Mahmood and Seppo Pahnila},
  journal={Information & Management},
  year={2014},
  volume={51},
  pages={217-224}
}
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees’ adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity… CONTINUE READING
Highly Influential
This paper has highly influenced 12 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 65 extracted citations

The Role of Social Status and Controllability on Employee Intent to Follow Organizational Information Security Requirements

2015 48th Hawaii International Conference on System Sciences • 2015
View 14 Excerpts
Highly Influenced

An information security knowledge sharing model in organizations

Computers in Human Behavior • 2016
View 3 Excerpts
Highly Influenced

Information security policies: Investigation of compliance in universities

2016 3rd International Conference on Computer and Information Sciences (ICCOINS) • 2016
View 13 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 17 references

Why there aren't more information security research studies

Information & Management • 2004
View 3 Excerpts
Highly Influenced

Does culture really matter ? A cross - cultural analysis of security countermeasure effectiveness based on deterrence theory

J. D’Arcy A. Hovav
Inf . Manage . • 2012

J

A. Hovav
D’Arcy, Does culture really matter? A cross-cultural analysis of security countermeasure effectiveness based on deterrence theory Inf. Manage. 49 (2) • 2012
View 2 Excerpts

Similar Papers

Loading similar papers…