SEEING THE FOREST AND THE TREES: A META-ANALYSIS OF THE ANTECEDENTS TO INFORMATION SECURITY POLICY COMPLIANCE

被引:191
作者
Cram, W. Alec [1 ]
D'Arcy, John [2 ,3 ]
Proudfoot, Jeffrey G. [1 ]
机构
[1] Bentley Univ, 175 Forest St, Waltham, MA 02452 USA
[2] Univ Delaware, Dept Accounting, 356 Purnell Hall, Newark, DE 19716 USA
[3] Univ Delaware, MIS, 356 Purnell Hall, Newark, DE 19716 USA
基金
美国国家科学基金会;
关键词
Information security; cybersecurity; information security policies; compliance; meta-analysis; relative weight analysis; PROTECTION MOTIVATION THEORY; COMMON METHOD VARIANCE; FILE-DRAWER PROBLEM; EMPLOYEES COMPLIANCE; MANAGEMENT SUPPORT; PLANNED BEHAVIOR; USER PARTICIPATION; STATISTICAL TESTS; PUBLICATION BIAS; SYSTEMS MISUSE;
D O I
10.25300/MISQ/2019/15117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have hampered efforts to attain a clear understanding of what truly drives this behavior. To address this theoretical stalemate and build toward a consensus on the key antecedents of employees' security policy compliance in different contexts, we conducted a meta-analysis of the relevant literature. Drawing on 95 empirical papers, we classified 401 independent variables into 17 distinct categories and analyzed each category's relationship with security policy compliance, including an analysis for possible domain-specific moderators. A meta-analytic relative weight analysis determined the relative importance of each category in predicting security policy compliance, while adding robustness to our findings. At a broad level, our results suggest that much of the security policy compliance literature is plagued by suboptimal theoretical framing. Our findings can facilitate more refined theory-building efforts in this research domain and serve as a guide for practitioners to manage security policy compliance initiatives.
引用
收藏
页码:525 / +
页数:54
相关论文
共 272 条
  • [1] THE THEORY OF PLANNED BEHAVIOR
    AJZEN, I
    [J]. ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) : 179 - 211
  • [2] Al-Omari A., 2012, P 18 AM C INF SYST S, P1
  • [3] Anderson CL, 2010, MIS QUART, V34, P613
  • [4] [Anonymous], P EUR MED C INF SYST
  • [5] [Anonymous], P MED C INF SYST VER
  • [6] [Anonymous], P 1 INT C INT PLUS B
  • [7] [Anonymous], P 22 AM C INF SYST S
  • [8] [Anonymous], 2013, COMPUT SECUR, DOI DOI 10.1016/j.cose.2013.09.009
  • [9] [Anonymous], P PACIFIC ASIA C INF
  • [10] [Anonymous], EUR C INF SYST