Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model

被引:54
作者
Chen, Yan [1 ]
Galletta, Dennis F. [2 ]
Lowry, Paul Benjamin [3 ]
Luo, Xin [4 ]
Moody, Gregory D. [5 ]
Willison, Robert [6 ]
机构
[1] Florida Int Univ, Coll Business, Miami, FL 33199 USA
[2] Univ Pittsburgh, Katz Grad Sch Business, Pittsburgh, PA 15260 USA
[3] Virginia Tech, Pamplin Coll Business, Blacksburg, VA 24061 USA
[4] Univ New Mexico, Anderson Sch Management, Albuquerque, NM 87131 USA
[5] Univ Nevada, Lee Business Sch, Las Vegas, NV 89154 USA
[6] Xian Jiaotong Liverpool Univ, Int Business Sch Suzhou, Suzhou 215123, Jiangsu, Peoples R China
关键词
information security; extended parallel processing model; protection motivation theory; organizational security; PROTECTION MOTIVATION; FEAR APPEALS; HEALTH-RISK; SYSTEMS; BEHAVIORS; DESIGN; DETERRENCE; THREATS; IMPACT; TRUST;
D O I
10.1287/isre.2021.1014
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Organizational information security (ISec) threats have exploded with advances in globalization and technology. Thus, organizations are scrambling to find both technical and behavioral approaches to shore up security. Whereas security technologies are crucial to these efforts, they are often rendered useless by employees' misunderstanding, carelessness, or deliberate disregard of ISec polices (ISPs). Accordingly, organizations are increasingly seeking ways to encourage employees to work as security allies. A key approach in many organizations is encouraging employees to better understand and comply with ISPs. Consequently, ISec research has leveraged several theories to identify the underlying reasons for ISP compliance behaviors among employees. However, most of this research focuses unilaterally on compliance without simultaneously considering noncompliance, as if noncompliance were caused by opposite factors. A pressing need thus exists for a theoretical foundation that can consider both common outcomes and whether there is an explainable tipping point that can explain when a normally compliant employee chooses to become noncompliant, and vice versa. In this study, we contextualize the extended parallel process model (EPPM) to ISP compliance by accounting for dual outcomes of compliance/noncompliance and dual roles of coping-problem-focused coping and emotion-focused coping. We further extend the EPPM to include response costs and maladaptive rewards to predict the two possible outcomes. Additionally, we employ a weighted discriminant value measurement approach to examine the tipping point between compliance and noncompliance. To test our resulting theoretical model and new measure, we conducted two separate empirical studies with 816 employees, using survey and scenario methodologies. The empirical results from these studies indicate that our contextualization and extension of EPPM better explain the gaps than alternative theories in the ISP literature.
引用
收藏
页码:1043 / 1065
页数:24
相关论文
共 115 条
  • [1] Consumer motivations in taking action against spyware: An empirical investigation
    Gurung, Anil
    Luo, Xin
    Liao, Qinyu
    [J]. Information Management and Computer Security, 2009, 17 (03): : 276 - 289
  • [2] Establishing trust in electronic commerce through online word of mouth: An examination across genders
    Awad, Neveen F.
    Ragowsky, Arik
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 24 (04) : 101 - 121
  • [3] A Tailored Approach to Identifying and Addressing College Students' Online Health Information Literacy
    Banas, Jennifer
    [J]. AMERICAN JOURNAL OF HEALTH EDUCATION, 2008, 39 (04) : 228 - 236
  • [4] Belsley D.A., 2005, REGRESSION DIAGNOSTI
  • [5] Development of a measure of workplace deviance
    Bennett, RJ
    Robinson, SL
    [J]. JOURNAL OF APPLIED PSYCHOLOGY, 2000, 85 (03) : 349 - 360
  • [6] CONVENTIONAL WISDOM ON MEASUREMENT - A STRUCTURAL EQUATION PERSPECTIVE
    BOLLEN, K
    LENNOX, R
    [J]. PSYCHOLOGICAL BULLETIN, 1991, 110 (02) : 305 - 314
  • [7] WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS
    Boss, Scott R.
    Galletta, Dennis F.
    Lowry, Paul Benjamin
    Moody, Gregory D.
    Polak, Peter
    [J]. MIS QUARTERLY, 2015, 39 (04) : 837 - U461
  • [8] If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
    Boss, Scott R.
    Kirsch, Laurie J.
    Angermeier, Ingo
    Shingler, Raymond A.
    Boss, R. Wayne
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) : 151 - 164
  • [9] Bulgurcu B, 2010, MIS QUART, V34, P523
  • [10] The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking
    Burns, A. J.
    Roberts, Tom L.
    Posey, Clay
    Lowry, Paul Benjamin
    [J]. INFORMATION SYSTEMS RESEARCH, 2019, 30 (04) : 1228 - 1247