Information Security Compliance in Organizations: An Institutional Perspective

被引:0
|
作者
AlKalbani A. [2 ]
Deng H. [2 ]
Kam B. [2 ]
Zhang X. [1 ]
机构
[1] School of Information Management, Wuhan University, Wuhan
[2] School of Business Information Technology and Logistics, RMIT University, Melbourne
基金
中国国家自然科学基金;
关键词
empirical study; information security; information security compliance; institutional pressures; management support;
D O I
10.1515/dim-2017-0006
中图分类号
学科分类号
摘要
The increasing recognition of the importance of information security has created institutional pressures on organizations to comply with information security standards and policies for protecting their information. How such pressures influence information security compliance in organisations, however, is unclear. This paper presents an empirical study to investigate the impact of institutional pressures on information security compliance in organizations. With the use of structural equation modelling for analysing the data collected through an online survey, the study shows that coercive pressures, normative pressures, and mimetic pressures positively influence information security compliance in organizations. It reveals that the benefits of information security compliance motivate management to strengthen their commitments at information security compliance. Furthermore, the study finds out that social pressures do not have a significant impact on management commitments towards information security compliance. Theoretically this study contributes to the information security research by better understanding how institutional pressures can be used for enhancing information security compliance in organizations. Practically this study informs information security policy makers of the major institutional drivers for information security compliance. © 2017 © 2017 Ahmed AlKalbani et al.
引用
收藏
页码:104 / 114
页数:10
相关论文
共 50 条
  • [31] Beyond compliance: China, international organizations, and global security
    Chan, Gerald
    CHINA JOURNAL, 2008, 60 : 151 - 154
  • [32] Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance
    Park, Minjung
    Chai, Sangmi
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4723 - 4731
  • [33] An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective
    Han, JinYoung
    Kim, Yoo Jung
    Kim, Hyungjin
    COMPUTERS & SECURITY, 2017, 66 : 52 - 65
  • [34] Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective
    Bansal, Gaurav
    Shin, Soo Il
    AMCIS 2016 PROCEEDINGS, 2016,
  • [35] ASPECTS OF INFORMATION SECURITY IN THE MANAGEMENT OF ORGANIZATIONS
    Telespan, Constantin
    GLOBALIZATION AND INTERCULTURAL DIALOGUE: MULTIDISCIPLINARY PERSPECTIVES - ECONOMY AND MANAGEMENT, 2014, : 784 - 789
  • [36] The effective implementation of information security in organizations
    Hoppe, OA
    van Niekerk, J
    von Solms, R
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 1 - 18
  • [37] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [38] Strategic approach to information security in organizations
    Park, Sangseo
    Ruighaver, Tobias
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 26 - +
  • [39] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [40] On Optimizing the Path to Information Security Compliance
    Dieguez, Mauricio
    Sepulveda, Samuel
    Cares, Carlos
    2012 EIGHTH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC 2012), 2012, : 182 - 185