Employees' adherence to information security policies: An exploratory field study

被引:337
作者
Siponen, Mikko [1 ]
Mahmood, M. Adam [2 ]
Pahnila, Seppo [3 ]
机构
[1] Univ Jyvaskyla, Dept Comp & Informat Syst, SF-40351 Jyvaskyla, Finland
[2] Univ Texas El Paso, Dept Accounting & Informat Syst, El Paso, TX 79968 USA
[3] Univ Oulu, Dept Informat Proc Sci, SF-90100 Oulu, Finland
基金
芬兰科学院;
关键词
Information security; Information security policy compliance; Protection Motivation Theory; Cognitive Evaluation Theory; Theory of Reasoned Action; Threat appraisal; Self-efficacy; Response efficacy; Attitude; Normative beliefs; Rewards; Moderating effect; Work experience; Information systems security; Information systems security policies; Employees' compliance of information systems security policies; Multi-theory based model to explain employees' adherence to information security policies; SEM-based analysis of the model; SYSTEMS MISUSE; DETERRENCE; MOTIVATION;
D O I
10.1016/j.im.2013.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees' attitude toward complying with information security policies, and social norms toward complying with these policies had a significant and positive effect on the employees' intention to comply with information security policies. Intention to comply with information security policies also had a significant impact on actual compliance with these policies. High level managers must warn employees of the importance of information security and why it is necessary to carry out these policies. In addition, employees should be provided with security education and hands on training. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:217 / 224
页数:8
相关论文
共 14 条
[1]  
Aytes K., 2004, Journal of Organizational and End User Computing, V16, P22, DOI 10.4018/joeuc.2004070102
[2]   Achievement-based rewards and intrinsic motivation: A test of cognitive mediators [J].
Cameron, J ;
Pierce, WD ;
Banko, KM ;
Gear, A .
JOURNAL OF EDUCATIONAL PSYCHOLOGY, 2005, 97 (04) :641-655
[3]   User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach [J].
D'Arcy, John ;
Hovav, Anat ;
Galletta, Dennis .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) :79-98
[4]   Protection motivation and deterrence: a framework for security policy compliance in organisations [J].
Herath, Tejaswini ;
Rao, H. Raghav .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :106-125
[5]   Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea [J].
Hovav, Anat ;
D'Arcy, John .
INFORMATION & MANAGEMENT, 2012, 49 (02) :99-110
[6]  
Johnston AC, 2010, MIS QUART, V34, P549
[7]  
Karjalainen M, 2011, J ASSOC INF SYST, V12, P518
[8]   Why there aren't more information security research studies [J].
Kotulic, AG ;
Clark, JG .
INFORMATION & MANAGEMENT, 2004, 41 (05) :597-607
[9]   How habit limits the predictive power of intention: The case of information systems continuance [J].
Limayem, Moez ;
Hirt, Sabine Gabriele ;
Cheung, Christy M. K. .
MIS QUARTERLY, 2007, 31 (04) :705-737
[10]   Common method biases in behavioral research: A critical review of the literature and recommended remedies [J].
Podsakoff, PM ;
MacKenzie, SB ;
Lee, JY ;
Podsakoff, NP .
JOURNAL OF APPLIED PSYCHOLOGY, 2003, 88 (05) :879-903