IMPACTS OF COMPREHENSIVE INFORMATION SECURITY PROGRAMS ON INFORMATION SECURITY CULTURE

被引:86
作者
Chen, Yan [1 ]
Ramamurthy, K. [2 ]
Wen, Kuang-Wei [3 ]
机构
[1] Auburn Univ, Montgomery, AL 36117 USA
[2] Univ Wisconsin, Milwaukee, WI 53201 USA
[3] Univ Wisconsin, La Crosse, WI 54601 USA
关键词
information security culture; security policy; security monitoring; SETA programs; POLICY COMPLIANCE; DETERRENCE; MANAGEMENT; MODELS; FRAMEWORK; FIT;
D O I
10.1080/08874417.2015.11645767
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of security breaches involve internal employee negligence and insider breach. This situation, coupled with the need to comply with regulatory mandates has led to the establishment of comprehensive information security programs in many organizations. However, the relationships between comprehensive information security programs and security culture are unclear This research thus proposes a research model to evaluate the influences of key components of comprehensive information security programs on security culture and empirically tests it. The results indicate that SETA programs awareness has significant influences on security culture and on employees' awareness of organizational security policy, and that the awareness of security monitoring also impacts security culture. The proposed research model can be used as a benchmark to evaluate the effectiveness of comprehensive information security pm grams, to improve the design of such programs should gaps exist, and eventually assist in building a security culture.
引用
收藏
页码:11 / 19
页数:9
相关论文
共 32 条
[1]   SOME METHODS FOR RESPECIFYING MEASUREMENT MODELS TO OBTAIN UNIDIMENSIONAL CONSTRUCT MEASUREMENT [J].
ANDERSON, JC ;
GERBING, DW .
JOURNAL OF MARKETING RESEARCH, 1982, 19 (04) :453-460
[2]  
[Anonymous], 2003, NIST Special Publication 800-50-Building an information technology security awareness program
[3]  
[Anonymous], 2004, Communications of the Association for Information Systems, DOI DOI 10.17705/1CAIS.01324
[4]  
BENTLER PM, 1990, PSYCHOL BULL, V107, P238, DOI 10.1037/0033-2909.88.3.588
[5]   ON THE FIT OF MODELS TO COVARIANCES AND METHODOLOGY TO THE BULLETIN [J].
BENTLER, PM .
PSYCHOLOGICAL BULLETIN, 1992, 112 (03) :400-404
[6]  
Browne M., 1993, Testing structural equation models, P136, DOI DOI 10.1177/0049124192021002005
[7]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[8]  
Chen Y., 2013, J MANAGE INFORM SYST, V29, P163
[9]   A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings [J].
D'Arcy, John ;
Herath, Tejaswini .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2011, 20 (06) :643-658
[10]   User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach [J].
D'Arcy, John ;
Hovav, Anat ;
Galletta, Dennis .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) :79-98