A study of human factors toward compliance with organization's information security policy

被引:0
|
作者
Arif, Muhammad [1 ]
Badila, Madalina [2 ]
Warden, Julia M. [3 ]
Rehman, Altaf Ur [4 ]
机构
[1] Inst Business Management, Hose D-46,NHS Phase-3,PNS Karsaz, Karachi 75350, Pakistan
[2] Lucian Blaga Univ, Def Studies Dept, Sibiu, Romania
[3] Univ Notre Dame, Business Management, Notre Dame, IN USA
[4] King Abdulaziz Univ, Marine Sci Dept, Jeddah, Saudi Arabia
关键词
Human factors; information security; information security policies; reinforcement; threat perception; AWARENESS; CULTURE;
D O I
10.1080/19393555.2025.2457702
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While organizations increasingly rely on information technology for competitive advantage, safeguarding sensitive data hinges on more than just technical safeguards. Alarmingly, employee actions account for a growing percentage of information security breaches, highlighting the critical role of human factors. Building upon the understanding that human resources are key to maintaining organizational security, this study investigates the relationship between five key human factors security culture, awareness, training, risk perception, and reinforcement and employee compliance with information security policies. Through quantitative research, we propose and validate a conceptual framework demonstrating a significant positive association between these human factors and compliant behavior. Our findings emphasize the profound influence of security culture as a primary driver of secure practices within organizations. These insights offer practical guidance for organizations to move beyond a technology centric approach and prioritize a human centric security strategy that integrates these factors into policy design, training programs, and organizational culture.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Dual Routes of Training on Information Security Policy Compliance
    Chen, Qiuyu
    Hong, Yuxiang
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [32] An Integrative Behavioral Model of Information Security Policy Compliance
    Kim, Sang Hoon
    Yang, Kyung Hoon
    Park, Sunyoung
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [33] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [34] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [35] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [36] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [37] Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective
    Al Nuaim, Abdullah
    Ramirez, Ronald
    Dincelli, Ersin
    AMCIS 2020 PROCEEDINGS, 2020,
  • [38] Information Security Policy Compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
    Alzahrani, Ahmed
    Johnson, Chris
    Altamimi, Saad
    2018 4TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2018), 2018, : 125 - 132
  • [39] The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (04) : 583 - 614
  • [40] Factors influencing protection motivation and IS security policy compliance
    Siponen, Mikko
    Pahnila, Seppo
    Mahmood, Adam
    2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 166 - 170