Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees' Information Security Compliance

被引:0
作者
Tejay, Gurvirender P. S. [1 ]
Winkfield, Marcus [2 ]
机构
[1] Hofstra Univ, Hempstead, NY 11549 USA
[2] Univ Maryland, Global Campus, Largo, MD 20783 USA
关键词
IS security leadership; Security compliance; Expectancy theory; Security outcomes; SYSTEMS SECURITY; POLICY COMPLIANCE; TRANSFORMATIONAL LEADERSHIP; PROTECTION MOTIVATION; EXPECTANCY-THEORY; RISK-ASSESSMENT; GOAL THEORY; DETERRENCE; FRAMEWORK; ORGANIZATIONS;
D O I
10.1007/s10796-025-10592-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations continue to struggle with motivating employee compliance with information systems (IS) security protocols despite implementing technical and managerial strategies. This study examines the critical role of leadership behaviors in fostering security compliance among employees. We assert that effective leadership can significantly influence adherence to IS security controls. Grounded in expectancy theory, our research model investigates how task-oriented and relationship-oriented leadership behaviors impact perceived security efforts and performance, ultimately shaping expected security outcomes. Data were collected from 407 participants through a cross-sectional survey, and structural equation modeling was employed for analysis. The findings reveal that task-oriented leadership is particularly effective in motivating IS security compliance. Furthermore, individual-level analyses highlight task-oriented leadership as the sole behavior demonstrating a direct relationship with the expected security outcomes of compliance. These insights enrich our understanding of security compliance behaviors as primarily driven by extrinsic motivation. We encourage future research to explore the role of intrinsic motivators and the potential indirect effects of relationship-oriented leadership behaviors on IS security policy compliance. By illuminating the behavioral dynamics of leadership, this study paves the way for organizations to enhance their IS security programs and cultivate a culture of compliance.
引用
收藏
页数:21
相关论文
共 127 条
[22]  
Cleveland S., 2018, MWAIS 2018 P, P49
[23]  
Coetsee L D., 2003, Peak performance and productivity: A practical guide for the creation of a motivating climate
[24]   Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security [J].
Collmann, Jeff ;
Cooper, Ted .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2007, 14 (02) :239-243
[25]   'What a waste of time': An examination of cybersecurity legitimacy [J].
Cram, W. Alec ;
D'Arcy, John .
INFORMATION SYSTEMS JOURNAL, 2023, 33 (06) :1396-1422
[26]  
D'Arcy John, 2014, Information Management & Computer Security, V22, P474, DOI 10.1108/IMCS-08-2013-0057
[27]   A framework and assessment instrument for information security culture [J].
Da Veiga, A. ;
Eloff, J. H. P. .
COMPUTERS & SECURITY, 2010, 29 (02) :196-207
[28]  
Dixon L.M., 2010, Journal of Managerial Issues, V22, P52
[29]   Theorizing Information Security Success: Towards Secure E-Government [J].
Dukerley, Kimberley ;
Tejay, Gurvirender .
INTERNATIONAL JOURNAL OF ELECTRONIC GOVERNMENT RESEARCH, 2010, 6 (03) :31-41
[30]  
Elahi G., 2007, Conceptual Modeling-ER 2007, DOI [10.1007/978-3-540-75563-026, DOI 10.1007/978-3-540-75563-026]