Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees' Information Security Compliance

被引:0
作者
Tejay, Gurvirender P. S. [1 ]
Winkfield, Marcus [2 ]
机构
[1] Hofstra Univ, Hempstead, NY 11549 USA
[2] Univ Maryland, Global Campus, Largo, MD 20783 USA
关键词
IS security leadership; Security compliance; Expectancy theory; Security outcomes; SYSTEMS SECURITY; POLICY COMPLIANCE; TRANSFORMATIONAL LEADERSHIP; PROTECTION MOTIVATION; EXPECTANCY-THEORY; RISK-ASSESSMENT; GOAL THEORY; DETERRENCE; FRAMEWORK; ORGANIZATIONS;
D O I
10.1007/s10796-025-10592-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations continue to struggle with motivating employee compliance with information systems (IS) security protocols despite implementing technical and managerial strategies. This study examines the critical role of leadership behaviors in fostering security compliance among employees. We assert that effective leadership can significantly influence adherence to IS security controls. Grounded in expectancy theory, our research model investigates how task-oriented and relationship-oriented leadership behaviors impact perceived security efforts and performance, ultimately shaping expected security outcomes. Data were collected from 407 participants through a cross-sectional survey, and structural equation modeling was employed for analysis. The findings reveal that task-oriented leadership is particularly effective in motivating IS security compliance. Furthermore, individual-level analyses highlight task-oriented leadership as the sole behavior demonstrating a direct relationship with the expected security outcomes of compliance. These insights enrich our understanding of security compliance behaviors as primarily driven by extrinsic motivation. We encourage future research to explore the role of intrinsic motivators and the potential indirect effects of relationship-oriented leadership behaviors on IS security policy compliance. By illuminating the behavioral dynamics of leadership, this study paves the way for organizations to enhance their IS security programs and cultivate a culture of compliance.
引用
收藏
页数:21
相关论文
共 127 条
[1]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[2]  
Alter S., 2004, Communications of the Association for Information Systems, V14, P1, DOI 10.17705/1CAIS.01401
[3]   Case-based learning for cybersecurity leaders: A systematic review and research agenda [J].
Anderson, Ashley ;
Ahmad, Atif ;
Chang, Shanton .
INFORMATION & MANAGEMENT, 2024, 61 (07)
[4]   PREDICTING THE PERFORMANCE OF MEASURES IN A CONFIRMATORY FACTOR-ANALYSIS WITH A PRETEST ASSESSMENT OF THEIR SUBSTANTIVE VALIDITIES [J].
ANDERSON, JC ;
GERBING, DW .
JOURNAL OF APPLIED PSYCHOLOGY, 1991, 76 (05) :732-740
[5]   Gender difference and employees' cybersecurity behaviors [J].
Anwar, Mohd ;
He, Wu ;
Ash, Ivan ;
Yuan, Xiaohong ;
Li, Ling ;
Xu, Li .
COMPUTERS IN HUMAN BEHAVIOR, 2017, 69 :437-443
[6]  
Ashenden D., 2013, Information Security Journal: A Global Perspective, V22, P19
[7]   Risk assessment and risk management: Review of recent advances on their foundation [J].
Aven, Terje .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2016, 253 (01) :1-13
[8]   Managers' and Employees' Differing Responses to Security Approaches [J].
Balozian, Puzant ;
Leidner, Dorothy ;
Warkentin, Merrill .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) :197-210
[9]   Information system security commitment: A study of external influences on senior management [J].
Barton, Kevin A. ;
Tejay, Gurvirender ;
Lane, Michael ;
Terrell, Steve .
COMPUTERS & SECURITY, 2016, 59 :9-25
[10]  
Baskerville R., 1991, European Journal of Information Systems, V1, P121, DOI 10.1057/ejis.1991.20