Issues and Trends in Information Security Policy Compliance

被引:3
|
作者
Bhaharin, Surayahani Hasnul [1 ]
Mokhtar, Umi Asma [1 ]
Sulaiman, Rossilawati [1 ]
Yusof, Maryati Mohd [2 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi, Selangor, Malaysia
[2] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Software Technol & Management, Bangi, Selangor, Malaysia
关键词
compliance; information security policy; security behaviour; information security; information governance; threats; information security management; GOVERNANCE; EMPLOYEES; FRAMEWORK; MODEL; IMPLEMENTATION; MANAGEMENT; AWARENESS; THREATS; IMPACT;
D O I
10.1109/icriis48246.2019.9073645
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of Industry 4.0 (IR 4.0), information leakage has become a critical issue for information security. The basic approach to addressing information leakage threats is to implement an information security policy (ISP) that defines the standards, boundaries, and responsibilities of users of information and technology of an organization. ISPs are one of the most commonly used methods for controlling internal user security behaviours, which include, but not limited to, computer usage ethics; organizational system usage policies; Internet and email usage policies; and the use of social media. Human error is the main security threat to information security, resulting from negligence, ignorance, and failure to adhere to organizational information security policies. Information security incidents are a problem related to human behaviour because technology is designed and operated by humans, presenting the opportunities and spaces for human error. In addition to the factor of human error as the main source of information leakage, this study aims to systematically analyse the fundamental issues of information security policy compliance. An analysis of these papers identifies and categories critical factor that effect an employee's attitude toward compliance with ISP. The human, process, technology element and information governance should be thought as a significant scope for more efficiency of information security policy compliance and in any further extensive studies to improve on information security policy compliance. Therefore, to ensure these are properly understood, further study is needed to identity the information governance that needs to be included in organizations and current best practices for developing an information security policy compliance within organizations.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [2] Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance
    Park, Minjung
    Chai, Sangmi
    [J]. PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4723 - 4731
  • [3] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [4] Information Security Policy Compliance: Leadership and Trust
    Paliszkiewicz, Joanna
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) : 211 - 217
  • [5] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    [J]. COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [6] The role of norms in information security policy compliance
    Wiafe, Isaac
    Koranteng, Felix Nti
    Wiafe, Abigail
    Obeng, Emmanuel Nyarko
    Yaokumah, Winfred
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 743 - 761
  • [7] Psychological Capital and Information Security Policy Compliance
    Zhao, Jiaqing
    Hong, Yuxiang
    Chen, Wenqing
    Chen, Chouyong
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [8] Predictors of Success in Information Security Policy Compliance
    Nord, Jeretta
    Sargent, Carol Springer
    Koohang, Alex
    Marotta, Angelica
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (04) : 863 - 873
  • [9] Behavioral Approach to Information Security Policy Compliance
    Mady, Ashraf
    Gupta, Saurabh
    [J]. AMCIS 2017 PROCEEDINGS, 2017,
  • [10] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946