Protective Measures and Security Policy Non-Compliance Intention: IT Vision Conflict as a Moderator

被引:33
作者
Chang, Kuo-Chung [1 ]
Seow, Yoke May [2 ]
机构
[1] Yuan Ze Univ, Dept Informat Management, Taoyuan, Taiwan
[2] Yuan Ze Univ, Informat Management, Taoyuan, Taiwan
关键词
Familiarity With Information Security Policy; Information Security Policy Non-Compliance Intention; Information Security; IT Vision Conflict; Perceived Severity; Protection Motivation Theory; Rewards; INFORMATION-TECHNOLOGY; MOTIVATION; MODEL; VIOLATIONS; EMPLOYEES; WORKPLACE; ADHERENCE; INSIGHTS; BEHAVIOR; DIVIDE;
D O I
10.4018/JOEUC.2019010101
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internal vulnerabilities and insider threats top the list of information security (InfoSec) incidents; prompting organizations to establish InfoSec policy (ISP). Yet, mitigating user's ISP non-compliance is still an arduous task. Hence, this study aims to minimize user's ISP non-compliance intention by investigating their perception and attitude toward ISP non-compliance. Specifically, protective measures drawing upon the protection motivation theory - perceived severity of ISP non-compliance, rewards and familiarity with ISP - analyze users' attitude toward ISP non-compliance. Further, the new construct, information technology (IT) vision conflict, is the mismatch between the values that users hold and those embedded in the ISP. The misalignment of the two conflicting values moderates the relationship between the protective measures and attitude toward ISP non-compliance. Findings show that IT vision conflict weakens the negative relationship between perceived severity of ISP non-compliance and attitude toward ISP non-compliance; indirectly affecting ISP non-compliance intention.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 55 条
[1]   The information security digital divide between information security managers and users [J].
Albrechtsen, Eirik ;
Hovden, Jan .
COMPUTERS & SECURITY, 2009, 28 (06) :476-490
[2]   DEVELOPMENT OF A TOOL FOR MEASURING AND ANALYZING COMPUTER USER SATISFACTION [J].
BAILEY, JE ;
PEARSON, SW .
MANAGEMENT SCIENCE, 1983, 29 (05) :530-545
[3]   MEASURING USER PARTICIPATION, USER INVOLVEMENT, AND USER ATTITUDE [J].
BARKI, H ;
HARTWICK, J .
MIS QUARTERLY, 1994, 18 (01) :59-82
[4]   Don't make excuses! Discouraging neutralization to reduce IT policy violation [J].
Barlow, Jordan B. ;
Warkentin, Merrill ;
Ormond, Dustin ;
Dennis, Alan R. .
COMPUTERS & SECURITY, 2013, 39 :145-159
[5]   If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security [J].
Boss, Scott R. ;
Kirsch, Laurie J. ;
Angermeier, Ingo ;
Shingler, Raymond A. ;
Boss, R. Wayne .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :151-164
[6]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[7]  
Chan M., 2005, J INFORM PRIVACY SEC, V1, P18, DOI DOI 10.1080/15536548.2005.10855772
[8]   Organizations' Information Security Policy Compliance: Stick or Carrot Approach? [J].
Chen, Yan ;
Ramamurthy, K. ;
Wen, Kuang-Wei .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) :157-188
[9]  
Chin W. W., 2010, HDB PARTIAL LEAST SQ, P655, DOI DOI 10.1007/978-3-540-32827-829
[10]   Influence of HRM Practices on Privacy Policy Compliance Intention: A Study among Bank Employees in Korea [J].
Choi, Youngkeun ;
Yoo, Taejong .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01) :9-18