Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance

被引:12
|
作者
Koohang, Alex [1 ]
Nord, Jeretta Horn [2 ]
Sandoval, Zoroayka, V [1 ]
Paliszkiewicz, Joanna [3 ]
机构
[1] Middle Georgia State Univ, Macon, GA USA
[2] Oklahoma State Univ, Stillwater, OK 74078 USA
[3] Warsaw Univ Life Sci, Warsaw, Poland
关键词
Information security policy; compliance; behavior; PROTECTION MOTIVATION; FEAR APPEALS; COMPLIANCE LEADERSHIP; NEUTRALIZATION; INSIGHTS; HABIT; DETERRENCE; FRAMEWORK; MORALITY; THREATS;
D O I
10.1080/08874417.2020.1779151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this paper was to first examine the reliability, validity, and strength of a unified model for information security policy compliance that includes eight constructs explaining information security policy compliance. Second, seven hypotheses were developed and tested based on the constructs in the model. An instrument with eight constructs was used to reflect the traditional survey statements method that measures current or retrospective behavior for the items of each construct. A sample of 187 faculty and staff from a mid-sized university in the USA participated in the study. Data were collected electronically and analyzed through SmartPLS 3.0, a partial least square structural equation modeling software. The results indicated strong support for the models' reliability, validity, and strength. The results also showed support for five hypotheses. Two hypotheses were rejected. The findings with implications are discussed. Recommendations for future research are made.
引用
收藏
页码:99 / 107
页数:9
相关论文
共 50 条
  • [1] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [2] Validating and extending the unified model of information security policy compliance
    Gerdin, Marcus
    INFORMATION AND COMPUTER SECURITY, 2025, 33 (01) : 25 - 48
  • [3] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [4] Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework
    Aggarwal, Akshay
    Srivastava, Shashi Kant
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2024, 34 (04) : 338 - 369
  • [5] An Integrative Behavioral Model of Information Security Policy Compliance
    Kim, Sang Hoon
    Yang, Kyung Hoon
    Park, Sunyoung
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [6] A Model of Information Security Policy Compliance for Public Universities: A Conceptual Model
    Angraini
    Alias, Rose Alinda
    Okfalisa
    EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 : 810 - 818
  • [7] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [8] Building an awareness-centered information security policy compliance model
    Koohang, Alex
    Anderson, Jonathan
    Nord, Jeretta Horn
    Paliszkiewicz, Joanna
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2019, 120 (01) : 231 - 247
  • [9] Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance
    Park, Minjung
    Chai, Sangmi
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4723 - 4731
  • [10] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,