Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes

被引:0
作者
Johnston, Allen C. [1 ]
Wech, Barbara [1 ]
Jack, Eric [1 ]
Beavers, Micah [1 ]
机构
[1] Univ Alabama Birmingham, Birmingham, AL 35294 USA
来源
AMCIS 2010 PROCEEDINGS | 2010年
关键词
Social learning theory; security; policy; remote; compliance; SELF-EFFICACY; INDICATORS; VALIDATION; BEHAVIOR; INTENT; IMPACT; MODEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an era of heightened sensitivity to issues of privacy or information security, concerns over policy compliance by all employees is of great importance. Many organizations are increasing the resources devoted to compliance training and efforts to inform employees of proper compliance behavior. Compliance by remote employees, however, is especially challenging as they are often not privy to the same resources provided of their in-house counterparts. Through a survey of over 500 remote and in-house employees, this study reveals factors that contribute to policy compliance and the discrepancies that exist between remote and in-house employees toward that goal. The findings reveal compliance intentions are significantly impacted by levels of awareness and self-efficacy, which are themselves influenced by the external cues of situational support, verbal persuasion, and vicarious experience. Further the findings suggest that there are significant differences in the awareness, self-efficacy, and compliance intention levels of remote and in-house employees.
引用
收藏
页数:13
相关论文
共 37 条
[1]   DIFFERENTIAL ENGAGEMENT OF SELF-REACTIVE INFLUENCES IN COGNITIVE MOTIVATION [J].
BANDURA, A ;
CERVONE, D .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1986, 38 (01) :92-113
[2]   SELF-EFFICACY - TOWARD A UNIFYING THEORY OF BEHAVIORAL CHANGE [J].
BANDURA, A .
PSYCHOLOGICAL REVIEW, 1977, 84 (02) :191-215
[3]  
Bandura A., 1986, SOCIAL FDN THOUGHT A
[4]  
Bandura A., 1988, AUST J MANAGE, V13, P275, DOI [DOI 10.1177/031289628801300210, 10.1177/031289628801300210]
[5]   Validation in information systems research: A state-of-the-art assessment [J].
Boudreau, MC ;
Gefen, D ;
Straub, DW .
MIS QUARTERLY, 2001, 25 (01) :1-16
[6]   CONVERGENT AND DISCRIMINANT VALIDATION BY THE MULTITRAIT-MULTIMETHOD MATRIX [J].
CAMPBELL, DT ;
FISKE, DW .
PSYCHOLOGICAL BULLETIN, 1959, 56 (02) :81-105
[7]   Prior family business exposure as intergenerational influence and entrepreneurial intent: A Theory of Planned Behavior approach [J].
Carr, Jon C. ;
Sequeira, Jennifer M. .
JOURNAL OF BUSINESS RESEARCH, 2007, 60 (10) :1090-1098
[8]   ON THE USE, USEFULNESS, AND EASE OF USE OF STRUCTURAL EQUATION MODELING IN MIS RESEARCH - A NOTE OF CAUTION [J].
CHIN, WW ;
TODD, PA .
MIS QUARTERLY, 1995, 19 (02) :237-246
[9]   Deterring internal information systems misuse [J].
D'Arcy, John ;
Hovav, Anat .
COMMUNICATIONS OF THE ACM, 2007, 50 (10) :113-117
[10]   User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach [J].
D'Arcy, John ;
Hovav, Anat ;
Galletta, Dennis .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) :79-98