Promoting Information Security Policy Compliance - An Empirical Study

被引:0
作者
Li, Lei [1 ]
Han, Meng [1 ]
机构
[1] Kennesaw State Univ, Coll Comp & Software Engn, Kennesaw, GA 30144 USA
来源
AMCIS 2020 PROCEEDINGS | 2020年
关键词
Information Security Policy; Security Policy Compliance; Action Research; Empirical Study; SYSTEMS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ensuring employees comply with the information security policy is an essential component of the security program in an organization. Grounded in action research and inspired by Unified Model of Information Security Compliance (UMISPC) (Moody et al. 2018), we introduce a customizable framework to promote information security policy compliance and lay out a plan to empirically test the proposed framework in a large public university in the southeast of US. The proposed framework can facilitate organizations to better understand their employees' non-compliance behaviors and create effective remediation actions. This research also validates the UMISPC in a university setting, which will contribute to the generalizability and refinement of the UMISPC model after the study is successfully carried out. The limitations and future directions of this project are also discussed.
引用
收藏
页数:5
相关论文
共 50 条
[31]   Validating and extending the unified model of information security policy compliance [J].
Gerdin, Marcus .
INFORMATION AND COMPUTER SECURITY, 2025, 33 (01) :25-48
[32]   Developing an Information Security Policy: A Case Study Approach [J].
Alqahtani, Fayez Hussain .
4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 :691-697
[33]   Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance [J].
Koohang, Alex ;
Nord, Jeretta Horn ;
Sandoval, Zoroayka, V ;
Paliszkiewicz, Joanna .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2021, 61 (02) :99-107
[34]   Understanding the Incentive Mechanism of Penalty for Information Security Policy Compliance Behavior [J].
Wang, Xiaolong ;
Li, Wenli .
2018 7TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, EDUCATION AND HUMANITIES RESEARCH (SSEHR 2018), 2018, :19-25
[35]   Information Security Policy Compliance Culture: Examining the Effects of Accountability Measures [J].
Amankwa, Eric ;
Loock, Marianne ;
Kritzinger, Elmarie .
INTERNATIONAL JOURNAL OF TECHNOLOGY AND HUMAN INTERACTION, 2021, 17 (04) :75-91
[36]   A Conceptual Analysis about the Organizational Impact of Compliance on Information Security Policy [J].
Cavallari, Maurizio .
EXPLORING SERVICES SCIENCE, 2012, 103 :101-114
[37]   The role of internal audit and user training in information security policy compliance [J].
Stafford, Thomas ;
Deitz, George ;
Li, Yaojie .
MANAGERIAL AUDITING JOURNAL, 2018, 33 (04) :410-424
[38]   Sanction severity and employees' information security policy compliance: Investigating mediating, moderating, and control variables [J].
Chen, Xiaofeng ;
Wu, Dazhong ;
Chen, Liqiang ;
Teng, Joe K. L. .
INFORMATION & MANAGEMENT, 2018, 55 (08) :1049-1060
[39]   From Information Security Awareness to Reasoned Compliant Action: Analyzing Information Security Policy Compliance in a Large Banking Organization [J].
Bauer, Stefan ;
Bernroider, Edward W. N. .
DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2017, 48 (03) :44-68
[40]   A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research [J].
Simon Trang ;
Benedikt Brendel .
Information Systems Frontiers, 2019, 21 :1265-1284