Do I really belong?: Impact of employment status on information security policy compliance

被引:35
作者
Sharma, Shwadhin [1 ]
Warkentin, Merrill [2 ]
机构
[1] Calif State Univ Monterey Bay, Coll Business, 100 Campus Ctr, Seaside, CA 93955 USA
[2] Mississippi State Univ, Dept Management & Informat Syst, BS Hood Rd, Mississippi State, MS 39759 USA
基金
美国国家科学基金会;
关键词
Permanent and temporary employees; Organizational commitment; Perceived organizational support; Response costs; Information security behaviors; PERCEIVED ORGANIZATIONAL SUPPORT; PROTECTION MOTIVATION; COMMITMENT; DETERRENCE; SYSTEMS; TECHNOLOGY; BEHAVIORS; TEMPORARY; BELIEFS; THREATS;
D O I
10.1016/j.cose.2018.09.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With recent incidents of temporary employees such as seasonal employees, contractors, and subcontractors engaging in information security violations, once again the focus lies on motivating the people within the "organization's wall" to comply with information security. This research paper studies the impact of employment status on organizational commitment and perceived organizational support of employees and how those will affect behavioral intention to comply with Information Security Policies (ISP). Employment status, specifically permanent versus temporary status, can result in different levels of organizational commitment and perceived organizational support. The result of the study supports the notion that the effect of organizational commitment and perceived organizational support on behavioral intention to use ISP will be stronger among permanent employees. The research also found that perceived response cost of performing a behavior would negatively impact intention to comply with ISP. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 61 条
[1]   The role of perceived organizational support and supportive human resource practices in the turnover process [J].
Allen, DG ;
Shore, LM ;
Griffeth, RW .
JOURNAL OF MANAGEMENT, 2003, 29 (01) :99-118
[2]  
[Anonymous], 2013, EY FINDINGS 2013 US
[3]  
[Anonymous], 2010, 5 ANN S INF ASS
[4]  
[Anonymous], 2007, CSI Survey 2007: The 12th Annual Computer Crime and Security Survey
[5]  
[Anonymous], 2013, US COMPANIES INCREAS
[6]  
Blau PM., 1964, Social exchange theory
[7]  
Blusiewicz J., 2014, CORNELL INT AFF REV, V8, P1
[8]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[9]  
Colarusso L., 2013, DAILY BEAST
[10]   COMPUTER SELF-EFFICACY - DEVELOPMENT OF A MEASURE AND INITIAL TEST [J].
COMPEAU, DR ;
HIGGINS, CA .
MIS QUARTERLY, 1995, 19 (02) :189-211