Predictors of Success in Information Security Policy Compliance

被引:5
作者
Nord, Jeretta [1 ]
Sargent, Carol Springer [2 ]
Koohang, Alex [2 ]
Marotta, Angelica [3 ]
机构
[1] Oklahoma State Univ, Stillwater, OK 74078 USA
[2] Middle Georgia State Univ, Macon, GA 31206 USA
[3] MIT, Sloan Sch Management, Cambridge, MA 02139 USA
关键词
Information security policy; compliance; leadership; supportive organizational culture; engagement; role values; BEHAVIOR; VIOLATIONS; MANAGEMENT; NEUTRALIZATION; LEADERSHIP; AWARENESS; BELIEFS; CULTURE; MODEL;
D O I
10.1080/08874417.2022.2067795
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this study is to build on the ISP compliance literature by creating a prediction model that includes four predictor variables, namely, leadership, supportive organizational culture, engagement, and role values with one dependent variable - ISP compliance. We then seek to find out which of the predictor variables are most influential in predicting ISP compliance. An instrument with 5 constructs was administered electronically to a diverse set of employees in the U.S.A. ranging in work experience from new hires to CEOs and from many industries. Collected data were analyzed using multiple regression analysis. The results showed that all predictor variables in the model were significant. Supportive organizational culture followed by role values offered the largest explanatory power of the four predictor variables. We discuss the implications of the findings and offer suggestions for future research opportunities.
引用
收藏
页码:863 / 873
页数:11
相关论文
共 50 条
  • [31] Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
    Chen, Yan
    Ramamurthy, K.
    Wen, Kuang-Wei
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) : 157 - 188
  • [32] Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence
    Chen, Yan
    Xia, Weidong
    Cousins, Karlene
    COMPUTERS & SECURITY, 2022, 113
  • [33] Employees' information security policy compliance: A norm activation perspective
    Yazdanmehr, Adel
    Wang, Jingguo
    DECISION SUPPORT SYSTEMS, 2016, 92 : 36 - 46
  • [34] Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    Bulgurcu B.
    Cavusoglu H.
    Benbasat I.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 523 - 548
  • [35] Exploring the factors influencing information security policy compliance and violations: A systematic literature review
    Balagopal, N.
    Mathew, Saji K.
    COMPUTERS & SECURITY, 2024, 147
  • [36] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [37] A Generic Framework for Information Security Policy Development
    Ismail, Wan Basri Wan
    Widyarto, Setyawan
    Ahmad, Raja Ahmad Tariqi Raja
    Abd Ghani, Khatipah
    2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 320 - 325
  • [38] EFFECTS OF DEVELOPER COGNITIVE STYLE AND MOTIVATIONS ON INFORMATION SECURITY POLICY COMPLIANCE
    Mahadevan, Lakshman
    Simon, Judith
    Meservy, Thomas
    AMCIS 2011 PROCEEDINGS, 2011,
  • [39] Information Security Policies Compliance among Employees in Cybersecurity Malaysia
    Kadir, Mohd Razilan Abdul
    Norman, Sharifah Norwahidah Syed
    Rahman, Safawi Abdul
    Ahmad, Abdul Rahman
    Bunawan, Ap-Azli
    VISION 2020: INNOVATION MANAGEMENT, DEVELOPMENT SUSTAINABILITY, AND COMPETITIVE ECONOMIC GROWTH, 2016, VOLS I - VII, 2016, : 2419 - 2430
  • [40] Using Galois Lattice to Represent and Analyze Information Security Policy Compliance
    Wang, Xiao-long
    Li, Wen-li
    PROCEEDINGS OF THE 5TH INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION (IEMI2014), 2015, : 353 - 358