Employees' Adherence to Information Security Policies: A Partial Replication

被引:0
作者
Sikolia, David [1 ]
Twitchell, Douglas [2 ]
Sagers, Glen [1 ]
机构
[1] Illinois State Univ, Normal, IL 61761 USA
[2] Boise State Univ, Boise, ID 83725 USA
来源
AMCIS 2016 PROCEEDINGS | 2016年
关键词
Information Security policy compliance; Protection Motivation Theory; Conceptual Replication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory based model that explained employees' adherence to security policies. Their paper combined elements from Protection Motivation Theory (PMT), the Theory of Reasoned Action, and Cognitive Evaluation Theory. This study is a partial conceptual replication of the PMT portion of their model. We collected our data from employees of a large mid-western university. Our results, based on 110 records contradict the findings of the original study. Where, three of the four constructs in the original study (Severity, Vulnerability, and Self-Efficacy) were found to be significant, our study found the opposite, the only significant path was Response Efficacy. Our study failed to replicate the findings in the original paper. Future studies are encouraged to methodically replicate the original study by using the same measures, treatments and statistics.
引用
收藏
页数:9
相关论文
共 50 条
[31]   The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions [J].
Chen, Lin ;
Xie, Zongxiao ;
Zhen, Jie ;
Dong, Kunxiang .
PSYCHOLOGY RESEARCH AND BEHAVIOR MANAGEMENT, 2022, 15 :1177-1191
[32]   Reducing fraud in organizations through information security policy compliance: An information security controls perspective [J].
Brown, Dennis ;
Batra, Gunjan ;
Zafar, Humayun ;
Saeed, Khawaja .
COMPUTERS & SECURITY, 2024, 144
[33]   Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance [J].
Topa, Ioanna ;
Karyda, Maria .
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 :169-179
[34]   The Cultural Foundation of Information Security Behavior: Developing a Cultural Fit Framework for Information Security Behavior Control [J].
Lin, Canchu ;
Kunnathur, Anand S. ;
Li, Long .
JOURNAL OF DATABASE MANAGEMENT, 2020, 31 (02) :21-41
[35]   Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders [J].
Posey, Clay ;
Roberts, Tom L. ;
Lowry, Paul Benjamin ;
Hightower, Ross T. .
INFORMATION & MANAGEMENT, 2014, 51 (05) :551-567
[36]   Information Security Culture for Guiding Employee's Security Behaviour: A Pilot Study [J].
Nasir, Akhyari ;
Arshah, Ruzaini Abdullah ;
Ab Harnid, Mohd Rashid .
2020 THE 6TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2020), 2020, :205-209
[37]   Reliable Behavioural Factors in the Information Security Context [J].
Mayer, Peter ;
Kunz, Alexandra ;
Volkamer, Melanie .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
[38]   Information Security Policy Compliance: Leadership and Trust [J].
Paliszkiewicz, Joanna .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) :211-217
[39]   Information Security Practices and Intervention Among Teenagers [J].
Radhakrishnan, Satish ;
Rajendran, Lavanya .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024, 64 (04) :577-591
[40]   Beyond Compliance: Empowering Employees' Extra-Role Security Behaviors in Dynamic Environments [J].
Li, Yaojie ;
Stafford, Tom ;
Fuller, Bryan ;
Ellis, Selwyn .
AMCIS 2017 PROCEEDINGS, 2017,