A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance

被引:0
作者
Sommestad, Teodor [1 ]
Hallberg, Jonas [1 ]
机构
[1] Swedish Def Res Agcy, Linkoping, Sweden
来源
SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS | 2013年 / 405卷
关键词
information security; security policy; security rule; policy compliance; policy violation; computer misuse; theory of planned behavior; REASONED ACTION; DETERRENCE; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The behaviour of employees influences information security in virtually all organisations. To inform the employees regarding what constitutes desirable behaviour, an information security policy can be formulated and communicated. However, not all employees comply with the information security policy. This paper reviews and synthesises 16 studies related to the theory of planned behaviour. The objective is to investigate 1) to what extent the theory explains information security policy compliance and violation and 2) whether reasonable explanations can be found when the results of the studies diverge. It can be concluded that the theory explains information security policy compliance and violation approximately as well as it explains other behaviours. Some potential explanations can be found for why the results of the identified studies diverge. However, many of the differences in results are left unexplained.
引用
收藏
页码:257 / 271
页数:15
相关论文
共 50 条
  • [1] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [2] The sufficiency of the theory of planned behavior for explaining information security policy compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (02) : 200 - 217
  • [3] Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    Ifinedo, Princely
    COMPUTERS & SECURITY, 2012, 31 (01) : 83 - 95
  • [4] Cyber-Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review
    Sulaiman, Noor Suhani
    Fauzi, Muhammad Ashraf
    Wider, Walton
    Rajadurai, Jegatheesan
    Hussain, Suhaidah
    Harun, Siti Aminah
    SOCIAL SCIENCES-BASEL, 2022, 11 (09):
  • [5] Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory
    Balozian, Puzant
    Leidner, Dorothy
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2017, 48 (03): : 11 - 43
  • [6] Information Security Policy Compliance: An Exploration of User Behaviour and Organizational Factors
    Angraini
    Alias, Rose Alinda
    Okfalisa
    ADVANCES ON INTELLIGENT INFORMATICS AND COMPUTING: HEALTH INFORMATICS, INTELLIGENT SYSTEMS, DATA SCIENCE AND SMART COMPUTING, 2022, 127 : 641 - 650
  • [7] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [8] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [9] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [10] Issues and Trends in Information Security Policy Compliance
    Bhaharin, Surayahani Hasnul
    Mokhtar, Umi Asma
    Sulaiman, Rossilawati
    Yusof, Maryati Mohd
    2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS: EMPOWERING DIGITAL INNOVATION (ICRIIS 2019), 2019,