A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance

被引:0
作者
Sommestad, Teodor [1 ]
Hallberg, Jonas [1 ]
机构
[1] Swedish Def Res Agcy, Linkoping, Sweden
来源
SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS | 2013年 / 405卷
关键词
information security; security policy; security rule; policy compliance; policy violation; computer misuse; theory of planned behavior; REASONED ACTION; DETERRENCE; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The behaviour of employees influences information security in virtually all organisations. To inform the employees regarding what constitutes desirable behaviour, an information security policy can be formulated and communicated. However, not all employees comply with the information security policy. This paper reviews and synthesises 16 studies related to the theory of planned behaviour. The objective is to investigate 1) to what extent the theory explains information security policy compliance and violation and 2) whether reasonable explanations can be found when the results of the studies diverge. It can be concluded that the theory explains information security policy compliance and violation approximately as well as it explains other behaviours. Some potential explanations can be found for why the results of the identified studies diverge. However, many of the differences in results are left unexplained.
引用
收藏
页码:257 / 271
页数:15
相关论文
共 50 条
  • [41] Examining the effects of cognitive load on information systems security policy compliance
    Ganye, Derrick
    Smith, Kane
    INTERNET RESEARCH, 2025, 35 (01) : 380 - 418
  • [42] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [43] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [44] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [45] Information security policy compliance: a replication study in Ethiopia
    Aebissa, Berhanu
    Dhillon, Gurpreet
    Meshesha, Million
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [46] Exploring the factors influencing information security policy compliance and violations: A systematic literature review
    Balagopal, N.
    Mathew, Saji K.
    COMPUTERS & SECURITY, 2024, 147
  • [47] Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective
    Al Nuaim, Abdullah
    Ramirez, Ronald
    Dincelli, Ersin
    AMCIS 2020 PROCEEDINGS, 2020,
  • [48] Association between stress and information security policy non-compliance behavior: A meta-analysis
    Aggarwal, Akshay
    Dhurkari, Ram Kumar
    COMPUTERS & SECURITY, 2023, 124
  • [49] Impact of employees' demographic characteristics on the awareness and compliance of information security policy in organizations
    Chua, Hui Na
    Wong, Siew Fan
    Low, Yeh Ching
    Chang, Younghoon
    TELEMATICS AND INFORMATICS, 2018, 35 (06) : 1770 - 1780
  • [50] A Theory-Based Review of Information Security Behavior in the Organization and Home Context
    Omidosu, Joseph
    Ophoff, Jacques
    2016 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND ENGINEERING (ICACCE 2016), 2016, : 225 - 231