Information Security Policies: A systematic review of theories explaining their compliance

被引:0
作者
Yupanqui J.R.A. [1 ]
Oré S.B. [1 ]
机构
[1] Unidad de Posgrado de la Facultad de Sistemas e Informática, Universidad Nacional Mayor de San Marcos (UNMSM), Av. Germán Amézaga s/n, Lima
来源
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao | 2017年 / 2017卷 / 25期
关键词
Compliance; Information Security Policies; Systematic review;
D O I
10.17013/risti.25.112-134
中图分类号
学科分类号
摘要
The information security policies implemented by organizations to protect their information is perhaps one of the issues that could generate controversy, due to the fact that despite their existence there are violations of information security, caused by the human factor. The different roles that people play, such as: end user, security team administrator, information administrator, security policy supervisor, information system attacker, etc., will have a different effect and consequence for each case. Through the systematic literature review it has been found that the most relevant theories that the authors are employing in their investigations related to compliance with security policies are focused on understanding human behavior through psychological or social theories, which leads to an interdisciplinary approach that allows a global vision, not only from a technological perspective, but from the perspective of other disciplines, which together lead to a real approach to the problem.
引用
收藏
页码:112 / 134
页数:22
相关论文
共 50 条
[21]   THE MODERATING EFFECT OF WORKING EXPERIENCE ON HEALTH INFORMATION SYSTEM SECURITY POLICIES COMPLIANCE BEHAVIOUR [J].
Humaidi, Norshima ;
Balakrishnan, Vimala .
MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2015, 28 (02) :70-92
[22]   Understanding the deterrence effect of punishment for marine information security policies non-compliance [J].
Wang, Xiaolong ;
Wang, Changlin ;
Yi, Tianyu ;
Li, Wenli .
JOURNAL OF OCEAN ENGINEERING AND SCIENCE, 2024, 9 (01) :9-12
[23]   Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies [J].
Lowry, Paul Benjamin ;
Moody, Gregory D. .
INFORMATION SYSTEMS JOURNAL, 2015, 25 (05) :433-463
[24]   A systematic review of scales for measuring information security culture [J].
Orehek, Spela ;
Petric, Gregor .
INFORMATION AND COMPUTER SECURITY, 2021, 29 (01) :133-158
[25]   A Systematic Review of Information Security Frameworks in the Internet of Things [J].
Irshad, Mohammad .
PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, :1270-1275
[26]   Information Availability as Driver of Information Security Investments: A Systematic Review Approach [J].
Dang, Duy ;
Nkhoma, Mathews .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS MANAGEMENT AND EVALUATION (ICIME 2013), 2013, :71-80
[27]   Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA [J].
Alrawhani, Ebrahim Mohammed ;
Romli, Awanis Binti ;
Al-Sharafi, Mohammed A. ;
Alkawsi, Gamal .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2025,
[28]   The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation [J].
Lee, Daeun ;
Lallie, Harjinder Singh ;
Michaelides, Nadine .
COGNITION TECHNOLOGY & WORK, 2023, 25 (2-3) :273-289
[29]   Explaining Consumer Safe Food Handling Through Behavior-Change Theories: A Systematic Review [J].
Young, Ian ;
Reimer, Danielle ;
Greig, Judy ;
Meldrum, Richard ;
Turgeon, Patricia ;
Waddell, Lisa .
FOODBORNE PATHOGENS AND DISEASE, 2017, 14 (11) :609-622
[30]   The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation [J].
Daeun Lee ;
Harjinder Singh Lallie ;
Nadine Michaelides .
Cognition, Technology & Work, 2023, 25 :273-289