Information Security Policy Compliance Culture: Examining the Effects of Accountability Measures

被引:3
作者
Amankwa, Eric [1 ]
Loock, Marianne [2 ]
Kritzinger, Elmarie [2 ]
机构
[1] Presbyterian Univ Coll, Abetifi, Ghana
[2] Univ South Africa, Pretoria, South Africa
关键词
Accountability; Awareness of Monitoring; Behavior Intention; Compliance; Culture; Expectation of Evaluation; Identifiability; Information Security Policy; Social Presence; PROTECTION MOTIVATION; INDIVIDUAL-DIFFERENCES; FRAMEWORK; AWARENESS; EMPLOYEES; BEHAVIOR;
D O I
10.4018/IJTHI.2021100105
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Information security policy (ISP) noncompliance is a growing problem that accounts for a significant number of security breaches in organizations. Existing strategies for changing employees' behavior intentions towards compliance have not been effective. It is therefore imperative to identify other effective strategies to address the problem. This article investigates the effect accountability constructs on employees' attitudes and behavior intentions towards establishing ISP compliance as a culture. In addition, the authors validate a testable research model for predicting employees' compliance behavior intentions in a field survey involving 313 employees from selected Ghanaian companies. The overall effect showed that measures of accountability significantly influenced employees' attitudes and behavior intentions to ISP compliance while the establishment of ISP compliance culture largely depended on the existence of a conducive information security culture and positive employee behavior intentions.
引用
收藏
页码:75 / 91
页数:17
相关论文
共 49 条
[1]   Design and validation of information security culture framework [J].
AlHogail, Areej .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 49 :567-575
[2]  
Alnatheer M, 2009, Proposed framework for understanding information security culture and practices in the Saudi context
[3]  
Alotaibi M, 2016, INT CONF INTERNET, P352, DOI 10.1109/ICITST.2016.7856729
[4]   Establishing information security policy compliance culture in organizations [J].
Amankwa, Eric ;
Loock, Marianne ;
Kritzinger, Elmarie .
INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) :420-436
[5]  
Amankwa E, 2014, INT CONF INTERNET, P248, DOI 10.1109/ICITST.2014.7038814
[6]  
[Anonymous], 2004, Schein, P3
[7]   See-through techniques for referential awareness in collaborative virtual reality [J].
Argelaguet, Ferran ;
Kulik, Alexander ;
Kunert, Andre ;
Andujar, Carlos ;
Froehlich, Bernd .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2011, 69 (06) :387-400
[8]   If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security [J].
Boss, Scott R. ;
Kirsch, Laurie J. ;
Angermeier, Ingo ;
Shingler, Raymond A. ;
Boss, R. Wayne .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :151-164
[9]  
Buthelezi MP, 2016, 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), P1360, DOI [10.1109/CSCI.2016.0254, 10.1109/CSCI.2016.253]
[10]   A framework and assessment instrument for information security culture [J].
Da Veiga, A. ;
Eloff, J. H. P. .
COMPUTERS & SECURITY, 2010, 29 (02) :196-207