Information Security Policies: A systematic review of theories explaining their compliance

被引:0
|
作者
Yupanqui J.R.A. [1 ]
Oré S.B. [1 ]
机构
[1] Unidad de Posgrado de la Facultad de Sistemas e Informática, Universidad Nacional Mayor de San Marcos (UNMSM), Av. Germán Amézaga s/n, Lima
来源
| 1600年 / Associacao Iberica de Sistemas e Tecnologias de Informacao卷 / 2017期
关键词
Compliance; Information Security Policies; Systematic review;
D O I
10.17013/risti.25.112-134
中图分类号
学科分类号
摘要
The information security policies implemented by organizations to protect their information is perhaps one of the issues that could generate controversy, due to the fact that despite their existence there are violations of information security, caused by the human factor. The different roles that people play, such as: end user, security team administrator, information administrator, security policy supervisor, information system attacker, etc., will have a different effect and consequence for each case. Through the systematic literature review it has been found that the most relevant theories that the authors are employing in their investigations related to compliance with security policies are focused on understanding human behavior through psychological or social theories, which leads to an interdisciplinary approach that allows a global vision, not only from a technological perspective, but from the perspective of other disciplines, which together lead to a real approach to the problem.
引用
收藏
页码:112 / 134
页数:22
相关论文
共 50 条
  • [1] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [2] Cyber-Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review
    Sulaiman, Noor Suhani
    Fauzi, Muhammad Ashraf
    Wider, Walton
    Rajadurai, Jegatheesan
    Hussain, Suhaidah
    Harun, Siti Aminah
    SOCIAL SCIENCES-BASEL, 2022, 11 (09):
  • [3] Factors influencing employee compliance with information security policies: a systematic literature review of behavioral and technological aspects in cybersecurity
    Delso-Vicente, Alberto-Tomas
    Diaz-Marcos, Luis
    Aguado-Tevar, Oscar
    de Blanes-Sebastian, Maria Garcia
    FUTURE BUSINESS JOURNAL, 2025, 11 (01)
  • [4] Critical factors influencing employees compliance with information security policies of an organization Systematic review and Meta-analysis
    Randle, O. A.
    Yolanda, Melo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, : 28 - 33
  • [5] Information Security Policies: Investigation of Compliance in Universities
    Hina, Sadaf
    Dominic, Dhanapal Durai
    2016 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2016, : 564 - 569
  • [6] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [7] A Composite Framework for Behavioral Compliance with Information Security Policies
    Aurigemma, Salvatore
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2013, 25 (03) : 32 - 51
  • [8] Enforcing business rules and information security policies through compliance audits - XISSF - A compliance specification mechanism
    Yip, Frederick
    Ray, Pradeep
    Paramesh, Nandan
    INFORMATION TECHNOLOGY MANAGEMENT FROM A BUSINESS PERSPECTIVE, 2006, : 81 - +
  • [9] Information Security Policies Compliance among Employees in Cybersecurity Malaysia
    Kadir, Mohd Razilan Abdul
    Norman, Sharifah Norwahidah Syed
    Rahman, Safawi Abdul
    Ahmad, Abdul Rahman
    Bunawan, Ap-Azli
    VISION 2020: INNOVATION MANAGEMENT, DEVELOPMENT SUSTAINABILITY, AND COMPETITIVE ECONOMIC GROWTH, 2016, VOLS I - VII, 2016, : 2419 - 2430
  • [10] Fear of Cybercrime and the Compliance with Information Security Policies: A Theoretical Study
    Alalwan, Jaffar Ahmad
    2018 9TH INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS, E-MANAGEMENT AND E-LEARNING (IC4E 2018), 2018, : 85 - 87