Information security policy compliance model in organizations

被引:200
作者
Safa, Nader Sohrabi [1 ]
Von Solms, Rossouw [1 ]
Furnell, Steven [1 ,2 ]
机构
[1] Nelson Mandela Metropolitan Univ, Ctr Res Informat & Cyber Secur, Sch ICT, Port Elizabeth, South Africa
[2] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England
关键词
Information security; Organization policies; Users' behaviour; Involvement; Attitude; CYBER SECURITY; SOCIAL BONDS; AWARENESS; MOTIVATION; KNOWLEDGE; USERS; PROTECTION; BEHAVIOR;
D O I
10.1016/j.cose.2015.10.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarantee a secure environment for information; the human aspects of information security should be taken into consideration, besides the technological aspects. The lack of information security awareness, ignorance, negligence, apathy, mischief, and resistance are the root of users' mistakes. In this research, a novel model shows how complying with organizational information security policies shapes and mitigates the risk of employees' behaviour. The significant aspect of this research is derived from the conceptualization of different aspects of involvement, such as information security knowledge sharing, collaboration, intervention and experience, as well as attachment, commitment, and personal norms that are important elements in the Social Bond Theory. The results of the data analysis revealed that information security knowledge sharing, collaboration, intervention and experience all have a significant effect on employees' attitude towards compliance with organizational information security policies. However, attachment does not have a significant effect on employees' attitude towards information security policy compliance. In addition, the findings have shown that commitment and personal norms affect employees' attitude. Attitude towards compliance with information security organizational policies also has a significant effect on the behavioural intention regarding information security compliance. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:70 / 82
页数:13
相关论文
共 65 条
[1]   User preference of cyber security awareness delivery methods [J].
Abawajy, Jemal .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2014, 33 (03) :236-247
[2]   Incident response teams - Challenges in supporting the organisational security function [J].
Ahmad, Atif ;
Hadgkiss, Justin ;
Ruighaver, A. B. .
COMPUTERS & SECURITY, 2012, 31 (05) :643-652
[3]   Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions [J].
Akhunzada, Adnan ;
Sookhak, Mehdi ;
Anuar, Nor Badrul ;
Gani, Abdullah ;
Ahmed, Ejaz ;
Shiraz, Muhammad ;
Furnell, Steven ;
Hayat, Amir ;
Khan, Muhammad Khurram .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 48 :44-57
[4]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[5]   Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study [J].
Albrechtsen, Eirik ;
Hoyden, Jan .
COMPUTERS & SECURITY, 2010, 29 (04) :432-445
[6]   Design and validation of information security culture framework [J].
AlHogail, Areej .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 49 :567-575
[7]  
[Anonymous], 2013, Infor Secur Tech Report, DOI DOI 10.1016/J.ISTR.2013.03.004
[8]   Security awareness of computer users: A phishing threat avoidance perspective [J].
Arachchilage, Nalin Asanka Gamagedara ;
Love, Steve .
COMPUTERS IN HUMAN BEHAVIOR, 2014, 38 :304-312
[9]  
Arbuckle J.L., 2007, AMOS 160 USERS GUIDE
[10]   Information Security management: A human challenge? [J].
Ashenden, Debi .
Information Security Technical Report, 2008, 13 (04) :195-201