Employees' Adherence to Information Security Policies: A Partial Replication

被引:0
|
作者
Sikolia, David [1 ]
Twitchell, Douglas [2 ]
Sagers, Glen [1 ]
机构
[1] Illinois State Univ, Normal, IL 61761 USA
[2] Boise State Univ, Boise, ID 83725 USA
来源
AMCIS 2016 PROCEEDINGS | 2016年
关键词
Information Security policy compliance; Protection Motivation Theory; Conceptual Replication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory based model that explained employees' adherence to security policies. Their paper combined elements from Protection Motivation Theory (PMT), the Theory of Reasoned Action, and Cognitive Evaluation Theory. This study is a partial conceptual replication of the PMT portion of their model. We collected our data from employees of a large mid-western university. Our results, based on 110 records contradict the findings of the original study. Where, three of the four constructs in the original study (Severity, Vulnerability, and Self-Efficacy) were found to be significant, our study found the opposite, the only significant path was Response Efficacy. Our study failed to replicate the findings in the original paper. Future studies are encouraged to methodically replicate the original study by using the same measures, treatments and statistics.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Employees' adherence to information security policies: An empirical study
    Siponen, Mikko
    Pahnila, Seppo
    Mahmood, Adam
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 133 - +
  • [2] Employees' adherence to information security policies: An exploratory field study
    Siponen, Mikko
    Mahmood, M. Adam
    Pahnila, Seppo
    INFORMATION & MANAGEMENT, 2014, 51 (02) : 217 - 224
  • [3] Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study
    Pahnila, Seppo
    Siponen, Mikko
    Mahmood, Adam
    PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2007, SECTIONS 1-6, 2007,
  • [4] Readability as lever for employees' compliance with information security policies
    Ammann, Franz-Emst
    Sowa, Aleksandra
    ISACA Journal, 2013, 4 : 39 - 42
  • [5] Information Security Policies Compliance among Employees in Cybersecurity Malaysia
    Kadir, Mohd Razilan Abdul
    Norman, Sharifah Norwahidah Syed
    Rahman, Safawi Abdul
    Ahmad, Abdul Rahman
    Bunawan, Ap-Azli
    VISION 2020: INNOVATION MANAGEMENT, DEVELOPMENT SUSTAINABILITY, AND COMPETITIVE ECONOMIC GROWTH, 2016, VOLS I - VII, 2016, : 2419 - 2430
  • [6] Are Employees Putting Your Company At Risk By Not Following Information Security Policies?
    Siponen, Mikko
    Mahmood, M. Adam
    Pahnila, Seppo
    COMMUNICATIONS OF THE ACM, 2009, 52 (12) : 145 - 147
  • [7] Employees' Intention to Comply with Information Security Policies: The Impacts of Loafing and Commitment
    Chiu, Chao-Min
    Cheng, Hsiang-Lan
    Hsu, Jack Shih-Chieh
    Tan, Chiew Mei
    Huang, Chiung Hui
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2024,
  • [8] From hindrance to challenge How employees understand and respond to information security policies
    Li, Ying
    Pan, Ting
    Zhang, Nan
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2020, 33 (01) : 191 - 213
  • [9] Not all information security-related stresses are equal: the effects of challenge and hindrance stresses on employees' compliance with information security policies
    Chen, Hao
    Hai, Yuge
    Tu, Lyu
    Fan, Jiajia
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2023, 43 (16) : 3939 - 3954
  • [10] Assessing Sunk Cost Effect on Employees' Intentions to Violate Information Security Policies in Organizations
    Kajtazi, Miranda
    Bulgurcu, Burcu
    Cavusoglu, Hasan
    Benbasat, Izak
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 3169 - 3177