Employees' Adherence to Information Security Policies: A Partial Replication

被引:0
作者
Sikolia, David [1 ]
Twitchell, Douglas [2 ]
Sagers, Glen [1 ]
机构
[1] Illinois State Univ, Normal, IL 61761 USA
[2] Boise State Univ, Boise, ID 83725 USA
来源
AMCIS 2016 PROCEEDINGS | 2016年
关键词
Information Security policy compliance; Protection Motivation Theory; Conceptual Replication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory based model that explained employees' adherence to security policies. Their paper combined elements from Protection Motivation Theory (PMT), the Theory of Reasoned Action, and Cognitive Evaluation Theory. This study is a partial conceptual replication of the PMT portion of their model. We collected our data from employees of a large mid-western university. Our results, based on 110 records contradict the findings of the original study. Where, three of the four constructs in the original study (Severity, Vulnerability, and Self-Efficacy) were found to be significant, our study found the opposite, the only significant path was Response Efficacy. Our study failed to replicate the findings in the original paper. Future studies are encouraged to methodically replicate the original study by using the same measures, treatments and statistics.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender
    Liu, Chenhui
    Liang, Huigang
    Wang, Nengmin
    Xue, Yajiong
    [J]. INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (02) : 802 - 834
  • [22] Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Kashif
    [J]. SUSTAINABILITY, 2020, 12 (20) : 1 - 27
  • [23] What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    Myyry, Liisa
    Siponen, Mikko
    Pahnila, Seppo
    Vartiainen, Tero
    Vance, Anthony
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) : 126 - 139
  • [24] Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
    Chen, Yan
    Galletta, Dennis F.
    Lowry, Paul Benjamin
    Luo, Xin
    Moody, Gregory D.
    Willison, Robert
    [J]. INFORMATION SYSTEMS RESEARCH, 2021, 32 (03) : 1043 - 1065
  • [25] Behavioral Approach to Information Security Policy Compliance
    Mady, Ashraf
    Gupta, Saurabh
    [J]. AMCIS 2017 PROCEEDINGS, 2017,
  • [26] IS professionals' information security behaviors in Chinese IT organizations for information security protection
    Ma, Xiaofen
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (01)
  • [27] Factors influencing employee compliance with information security policies: a systematic literature review of behavioral and technological aspects in cybersecurity
    Delso-Vicente, Alberto-Tomas
    Diaz-Marcos, Luis
    Aguado-Tevar, Oscar
    de Blanes-Sebastian, Maria Garcia
    [J]. FUTURE BUSINESS JOURNAL, 2025, 11 (01)
  • [28] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [29] An Exploration of the Search for Information Security
    Wang, Jingguo
    Xiao, Nan
    Rao, H. R.
    [J]. EXPLORING THE GRAND CHALLENGES FOR NEXT GENERATION E-BUSINESS, 2010, 52 : 177 - 180
  • [30] The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions
    Chen, Lin
    Xie, Zongxiao
    Zhen, Jie
    Dong, Kunxiang
    [J]. PSYCHOLOGY RESEARCH AND BEHAVIOR MANAGEMENT, 2022, 15 : 1177 - 1191