Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory

被引:46
作者
Balozian, Puzant [1 ]
Leidner, Dorothy [2 ,3 ,4 ]
机构
[1] Lebanese Amer Univ, Beirut, Lebanon
[2] Baylor Univ, Informat Syst, Waco, TX 76798 USA
[3] Baylor Univ, PhD Program Informat Syst, Waco, TX 76798 USA
[4] Lund Univ, Lund, Sweden
来源
DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS | 2017年 / 48卷 / 03期
关键词
Insider Threat; Information Systems Security; Review; Compliance; Noncompliance; Information Systems Security Policy; INFORMATION-SYSTEMS SECURITY; COMPUTER ABUSE; PROTECTION MOTIVATION; FEAR APPEALS; DETERRENCE; BEHAVIOR; MODEL; INSIGHTS; THREATS; MISUSE;
D O I
10.1145/3130515.3130518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent and malicious insiders. We begin by defining the terms, developing a new taxonomy of insiders, and then providing a comprehensive review of articles on IS policy compliance for the past 26 years. Grounding the analysis in the literature, we-inductively identify four themes to foster Information Security policy compliance among employees. The themes are: 1) IS management philosophy, 2) procedural countermeasures, 3) technical countermeasures, and 4) environmental countermeasures. We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory.
引用
收藏
页码:11 / 43
页数:33
相关论文
共 104 条
[91]   INCREASING ACCOUNTABILITY THROUGH USER-INTERFACE DESIGN ARTIFACTS: A NEW APPROACH TO ADDRESSING THE PROBLEM OF ACCESS-POLICY VIOLATIONS [J].
Vance, Anthony ;
Lowry, Paul Benjamin ;
Eggett, Dennis .
MIS QUARTERLY, 2015, 39 (02) :345-U402
[92]  
Vance A, 2014, J ASSOC INF SYST, V15, P679
[93]   Motivating IS security compliance: Insights from Habit and Protection Motivation Theory [J].
Vance, Anthony ;
Siponen, Mikko ;
Pahnila, Seppo .
INFORMATION & MANAGEMENT, 2012, 49 (3-4) :190-198
[94]  
Verizon, 2013, DAT BREACH INV REP
[95]   The influence of the informal social learning environment on information privacy policy compliance efficacy and intention [J].
Warkentin, Merrill ;
Johnston, Allen C. ;
Shropshire, Jordan .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2011, 20 (03) :267-284
[96]   Behavioral and policy issues in information systems security: the insider threat [J].
Warkentin, Merrill ;
Willison, Robert .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :101-105
[97]   In defense of the realm: understanding the threats to information security [J].
Whitman, ME .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2004, 24 (01) :43-57
[98]   Opportunities for computer crime: considering systems risk from a criminological perspective [J].
Willison, Robert ;
Backhouse, James .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2006, 15 (04) :403-414
[99]  
Willison R, 2013, MIS QUART, V37, P1
[100]   Security lapses and the omission of information security measures: A threat control model and empirical test [J].
Workman, Michael ;
Bommer, William H. ;
Straub, Detmar .
COMPUTERS IN HUMAN BEHAVIOR, 2008, 24 (06) :2799-2816