Organizational information security policies: a review and research framework

被引:150
作者
Cram, W. Alec [1 ]
Proudfoot, Jeffrey G. [1 ]
D'Arcy, John [2 ]
机构
[1] Bentley Univ, 175 Forest St, Waltham, MA 02452 USA
[2] Univ Delaware, 220 Purnell Hall, Newark, DE 19716 USA
关键词
information security; policy; security policy; compliance; literature review; research framework; SYSTEMS SECURITY; PROTECTION MOTIVATION; COMPUTER ABUSE; PLANNED BEHAVIOR; SOFTWARE PIRACY; EMPLOYEE MISUSE; UNITED-STATES; CONTROL MODEL; FEAR APPEALS; WORK SYSTEM;
D O I
10.1057/s41303-017-0059-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources should behave in order to prevent, detect, and respond to security incidents. However, this growing (and at times, conflicting) body of research has made it challenging for researchers and practitioners to comprehend the current state of knowledge on the formation, implementation, and effectiveness of security policies in organizations. Accordingly, the purpose of this paper is to synthesize what we know and what remains to be learned about organizational information security policies, with an eye toward a holistic understanding of this research stream and the identification of promising paths for future study. We review 114 influential security policy-related journal articles and identify five core relationships examined in the literature. Based on these relationships, we outline a research framework that synthesizes the construct linkages within the current literature. Building on our analysis of these results, we identify a series of gaps and draw on additional theoretical perspectives to propose a revised framework that can be used as a basis for future research.
引用
收藏
页码:605 / 641
页数:37
相关论文
共 274 条
[1]  
Aksulu A, 2010, J ASSOC INF SYST, V11, P576
[2]   An examination of factors that influence the number of information security policy violations in Qatari organizations [J].
Al-Mukahal, Hasan M. ;
Alshare, Khaled .
INFORMATION AND COMPUTER SECURITY, 2015, 23 (01) :102-118
[3]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[5]  
Alter S, 2013, J ASSOC INF SYST, V14, P72
[7]  
Anderson CL, 2010, MIS QUART, V34, P613
[8]  
[Anonymous], 270002016 ISOIEC
[9]  
[Anonymous], ISACA J
[10]  
[Anonymous], COMPUT SECUR