Promoting Information Security Policy Compliance - An Empirical Study

被引:0
作者
Li, Lei [1 ]
Han, Meng [1 ]
机构
[1] Kennesaw State Univ, Coll Comp & Software Engn, Kennesaw, GA 30144 USA
来源
AMCIS 2020 PROCEEDINGS | 2020年
关键词
Information Security Policy; Security Policy Compliance; Action Research; Empirical Study; SYSTEMS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ensuring employees comply with the information security policy is an essential component of the security program in an organization. Grounded in action research and inspired by Unified Model of Information Security Compliance (UMISPC) (Moody et al. 2018), we introduce a customizable framework to promote information security policy compliance and lay out a plan to empirically test the proposed framework in a large public university in the southeast of US. The proposed framework can facilitate organizations to better understand their employees' non-compliance behaviors and create effective remediation actions. This research also validates the UMISPC in a university setting, which will contribute to the generalizability and refinement of the UMISPC model after the study is successfully carried out. The limitations and future directions of this project are also discussed.
引用
收藏
页数:5
相关论文
共 50 条
[41]   A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research [J].
Simon Trang ;
Benedikt Brendel .
Information Systems Frontiers, 2019, 21 :1265-1284
[42]   Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance [J].
Ormond, Dustin ;
Warkentin, Merrill ;
Crossler, Robert E. .
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2019, 20 (12) :1794-1843
[43]   FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY [J].
Johnston, Allen C. ;
Warkentin, Merrill .
MIS QUARTERLY, 2010, 34 (03) :549-566
[44]   An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective [J].
Han, JinYoung ;
Kim, Yoo Jung ;
Kim, Hyungjin .
COMPUTERS & SECURITY, 2017, 66 :52-65
[45]   Do I really belong?: Impact of employment status on information security policy compliance [J].
Sharma, Shwadhin ;
Warkentin, Merrill .
COMPUTERS & SECURITY, 2019, 87
[46]   Protection motivation and deterrence: a framework for security policy compliance in organisations [J].
Herath, Tejaswini ;
Rao, H. Raghav .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :106-125
[47]   Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis [J].
Karlsson, Fredrik ;
Kolkowska, Ella ;
Petersson, Johan .
COMPUTERS & SECURITY, 2022, 114
[48]   Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study [J].
Inaba, Midori ;
Terada, Takeaki .
2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, :335-340
[49]   Understanding information security stress: Focusing on the type of information security compliance activity [J].
Lee, Chunghun ;
Lee, Choong C. ;
Kim, Suhyun .
COMPUTERS & SECURITY, 2016, 59 :60-70
[50]   The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors [J].
Amankwa, Eric ;
Loock, Marianne ;
Kritzinger, Elmarie .
INFORMATION AND COMPUTER SECURITY, 2022, 30 (04) :583-614