A Conceptual Analysis about the Organizational Impact of Compliance on Information Security Policy

被引:0
|
作者
Cavallari, Maurizio [1 ]
机构
[1] Catholic Univ, Dept Business Adm SE Gest A, Milan, Italy
来源
EXPLORING SERVICES SCIENCE | 2012年 / 103卷
关键词
Compliance; information security policy; ISP; information systems security; ISS; COMPETITIVE ADVANTAGE; SYSTEMS SECURITY; AWARENESS; MODEL; TECHNOLOGY; DETERRENCE; ADHERENCE; ECONOMICS; DESIGN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protection of data and information security are crucial to business processes and include technical, sociological and organizational aspects. The purpose of this paper is to explore the importance of information security policy and organizational compliance within a socio-technical framework. Citing come of the major compliance acts in the United States, this paper examines how the need arose for information security compliance and the antecedents that made compliance mandatory for organizations. This would apply to any organization, in whichever other country. within its legal compliance framework. A discussion follows to help shed light on how both individual employees and the organization as a whole often fail to implement a satisfactory compliance initiative. Finally, the research presents a set of key factors that influence successful implementation of information system security Compliance into the information security policy (ISP), along with what actions should be taken to make compliance a competitive advantage for the organization. taking advantage of the particular relationship between compliance and ISP.
引用
收藏
页码:101 / 114
页数:14
相关论文
共 50 条
  • [31] Do I really belong?: Impact of employment status on information security policy compliance
    Sharma, Shwadhin
    Warkentin, Merrill
    [J]. COMPUTERS & SECURITY, 2019, 87
  • [32] A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
    Trang, Simon
    Brendel, Benedikt
    [J]. INFORMATION SYSTEMS FRONTIERS, 2019, 21 (06) : 1265 - 1284
  • [33] A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
    Simon Trang
    Benedikt Brendel
    [J]. Information Systems Frontiers, 2019, 21 : 1265 - 1284
  • [34] The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7690 - 7695
  • [35] Dual Routes of Training on Information Security Policy Compliance
    Chen, Qiuyu
    Hong, Yuxiang
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [36] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    [J]. FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [37] An Integrative Behavioral Model of Information Security Policy Compliance
    Kim, Sang Hoon
    Yang, Kyung Hoon
    Park, Sunyoung
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [38] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    [J]. MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [39] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [40] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    [J]. SECURITY JOURNAL, 2019, 32 (04) : 391 - 409