Variables influencing information security policy compliance: A systematic review of quantitative studies

被引:125
作者
机构
[1] Swedish Defence Research Agency (FOI), Linköping
来源
Sommestad, T. (Teodor.Sommestad@foi.se) | 1600年 / JAI Press卷 / 22期
关键词
Individual behaviour; Information personnel; Information security; Internal control; Organizational policy; Policy;
D O I
10.1108/IMCS-08-2012-0045
中图分类号
学科分类号
摘要
Purpose - The purpose of this paper is to identify variables that influence compliance with information security policies of organizations and to identify how important these variables are. Design/methodology/approach - A systematic review of empirical studies described in extant literature is performed. This review found 29 studies meeting its inclusion criterion. The investigated variables in these studies and the effect size reported for them were extracted and analysed. Findings - In the 29 studies, more than 60 variables have been studied in relation to security policy compliance and incompliance. Unfortunately, no clear winners can be found among the variables or the theories they are drawn from. Each of the variables only explains a small part of the variation in people's behaviour and when a variable has been investigated in multiple studies the findings often show a considerable variation. Research limitations/implications - It is possible that the disparate findings of the reviewed studies can be explained by the sampling methods used in the studies, the treatment/control of extraneous variables and interplay between variables. These aspects ought to be addressed in future research efforts. Practical implications - For decision makers who seek guidance on how to best achieve compliance with their information security policies should recognize that a large number of variables probably influence employees' compliance. In addition, both their influence strength and interplay are uncertain and largely unknown. Originality/value - This is the first systematic review of research on variables that influence compliance with information security policies of organizations. Copyright © 2014 Emerald Group Publishing Limited. All rights reserved.
引用
收藏
页码:42 / 75
页数:33
相关论文
共 53 条
  • [1] Ajzen I., The theory of planned behavior, Organizational Behavior and Human Decision Processes, 50, 2, pp. 179-211, (1991)
  • [2] Ajzen I., Fishbein M., Understanding attitudes and predicting social behavior, Nebraska Symposium on Motivation, 27, pp. 65-116, (1979)
  • [3] Asgharpour F., Liu D., Camp L.J., Experimental evaluations of expert and non-expert computer users' mental models of security risks, The Workshop on the Economics of Information Security (WEIS), Pittsburgh, PA, pp. 1-24, (2007)
  • [4] Beautement A., Sasse M.A., Wonham M., The compliance budget: Managing security behaviour in organisations, Proceedings New Security Paradigms Workshop, Lake Tahoe, CA, USA, pp. 47-58, (2009)
  • [5] Becker B.J., Wu M.-J., The synthesis of regression slopes in meta-analysis, Statistical Science, 22, 3, pp. 414-429, (2007)
  • [6] Brereton P., Kitchenham B., Budgen D., Turner M., Khalil M., Lessons from applying the systematic literature review process within the software engineering domain, Journal of Systems and Software, 80, 4, pp. 571-583, (2007)
  • [7] Bulgurcu B., Cavusoglu H., Benbasat I., Effects of individual and organization based beliefs and the moderating role of work experience on insiders' good security behaviors, Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE, Vancouver, BC, Canada, 3, pp. 476-481, (2009)
  • [8] Bulgurcu B., Cavusoglu H., Benbasat I., Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly: Management Information Systems, 34, SPEC. ISSUE 3, pp. 523-548, (2010)
  • [9] Bulgurcu B., Cavusoglu H., Benbasat I., Quality and fairness of an information security policy as antecedents of employees' security engagement in the workplace: An empirical investigation, Proceedings of the Annual Hawaii International Conference on System Sciences, Piscataway, NJ, USA, pp. 1-7, (2010)
  • [10] Chan M., Woon I., Perceptions of information security in the workplace: Linking information security climate to compliant behavior, Journal of Information Privacy and Security, 1, 3, pp. 18-41, (2005)