Information Security Compliance in Organizations: An Institutional Perspective

被引:0
|
作者
AlKalbani A. [2 ]
Deng H. [2 ]
Kam B. [2 ]
Zhang X. [1 ]
机构
[1] School of Information Management, Wuhan University, Wuhan
[2] School of Business Information Technology and Logistics, RMIT University, Melbourne
基金
中国国家自然科学基金;
关键词
empirical study; information security; information security compliance; institutional pressures; management support;
D O I
10.1515/dim-2017-0006
中图分类号
学科分类号
摘要
The increasing recognition of the importance of information security has created institutional pressures on organizations to comply with information security standards and policies for protecting their information. How such pressures influence information security compliance in organisations, however, is unclear. This paper presents an empirical study to investigate the impact of institutional pressures on information security compliance in organizations. With the use of structural equation modelling for analysing the data collected through an online survey, the study shows that coercive pressures, normative pressures, and mimetic pressures positively influence information security compliance in organizations. It reveals that the benefits of information security compliance motivate management to strengthen their commitments at information security compliance. Furthermore, the study finds out that social pressures do not have a significant impact on management commitments towards information security compliance. Theoretically this study contributes to the information security research by better understanding how institutional pressures can be used for enhancing information security compliance in organizations. Practically this study informs information security policy makers of the major institutional drivers for information security compliance. © 2017 © 2017 Ahmed AlKalbani et al.
引用
收藏
页码:104 / 114
页数:10
相关论文
共 50 条
  • [41] Effects of IT-Culture Conflict and User Dissatisfaction on Information Security Policy Non-Compliance: A Sensemaking Perspective
    Chang, Kuo-Chung
    Seow, Yoke May
    AMCIS 2014 PROCEEDINGS, 2014,
  • [42] Information Security Culture Concept towards Information Security Compliance: A Comparison between IT and Non-IT Professionals
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    Fahmy, Syahrul
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2022, 14 (03): : 157 - 165
  • [43] SEEING THE FOREST AND THE TREES: A META-ANALYSIS OF THE ANTECEDENTS TO INFORMATION SECURITY POLICY COMPLIANCE
    Cram, W. Alec
    D'Arcy, John
    Proudfoot, Jeffrey G.
    MIS QUARTERLY, 2019, 43 (02) : 525 - +
  • [44] Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective
    Chu, Amanda M. Y.
    So, Mike K. P.
    SUSTAINABILITY, 2020, 12 (08)
  • [45] Information Security Maturity Model for Healthcare Organizations in the United States
    Barnes, Bridget
    Daim, Tugrul
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 928 - 939
  • [46] Information Security and Data Protection: The Role of the "Human Factor" in Organizations
    Hugl, Ulrike
    PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 80 - 87
  • [47] Information security incident management: Identified practice in large organizations
    Hove, Cathrine
    Tarnes, Marte
    Line, Maria B.
    Bernsmed, Karin
    2014 8TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT & IT FORENSICS (IMF 2014), 2014, : 27 - 46
  • [48] Information security policy compliance: a higher education case study
    Alshare, Khaled A.
    Lane, Peggy L.
    Lane, Michael R.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 91 - 108
  • [49] Social control through deterrence on the compliance with information security policy
    Choi, Myeonggil
    Song, Jeongseok
    SOFT COMPUTING, 2018, 22 (20) : 6765 - 6772
  • [50] Information Security Governance - Compliance management vs operational management
    von Solms, SH
    COMPUTERS & SECURITY, 2005, 24 (06) : 443 - 447