Understanding the Incentive Mechanism of Penalty for Information Security Policy Compliance Behavior

被引:4
作者
Wang, Xiaolong [1 ,2 ]
Li, Wenli [1 ]
机构
[1] Dalian Univ Technol, Fac Management & Econ, Dalian 116024, Peoples R China
[2] Shandong Transport Vocat Coll, Dept Management & Informat, Weifang 261206, Peoples R China
来源
2018 7TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, EDUCATION AND HUMANITIES RESEARCH (SSEHR 2018) | 2018年
基金
中国国家自然科学基金;
关键词
Incentive mechanism; Information security policy; Compliance behavior; Principal-agent model with moral hazard; Penalty; SYSTEMS SECURITY; MORAL HAZARD; DETERRENCE; MISUSE; ADHERENCE; THREATS; MODEL;
D O I
10.25236/ssehr.2018.005
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
A significant number of information security incidents have been attributed to the internal employees' failure to comply with the information security policy (ISP) in the organizational setting. There exists a principal-agent problem with moral hazard between the employer and the employee individual for the practical compliance effort of the employee is not observable without high costs. In this study, an ISP compliance game has been proposed to analyze the incentive mechanism of penalty on the compliance behavior of employee individual. It is shown that in a no-penalty contract, the employee will decline to comply with the ISP if the expected payoff obtained from her noncompliance is larger than that from the outside options; and in a penalty contract, an appropriate penalty will motivate her to exert the compliance effort level expected by her employer. A numerical example has been presented to show the validity of this game analysis.
引用
收藏
页码:19 / 25
页数:7
相关论文
共 41 条
  • [31] The Verizon Risk Team, 2017, 2017 DAT BREACH INV
  • [32] The Verizon Risk Team, 2016, 2016 DAT BREACH INV
  • [33] Towards information security behavioural compliance
    Vroom, C
    von Solms, R
    [J]. COMPUTERS & SECURITY, 2004, 23 (03) : 191 - 198
  • [34] Warkentin M., 2012, Proceedings of the Annual Symposium on Information Assurance (ASIA) 2012, Albany, New York, P1
  • [35] Warkentin M, 2008, ADV MANAG INFORM SYS, V11, P46
  • [36] Behavioral and policy issues in information systems security: the insider threat
    Warkentin, Merrill
    Willison, Robert
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) : 101 - 105
  • [37] Watson J., 2013, Strategy: an introduction to game theory
  • [38] Weirich D., 2006, THESIS
  • [39] Willison R., J ASSOC INF SYST
  • [40] Willison R, 2013, MIS QUART, V37, P1