Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance

被引:12
|
作者
Koohang, Alex [1 ]
Nord, Jeretta Horn [2 ]
Sandoval, Zoroayka, V [1 ]
Paliszkiewicz, Joanna [3 ]
机构
[1] Middle Georgia State Univ, Macon, GA USA
[2] Oklahoma State Univ, Stillwater, OK 74078 USA
[3] Warsaw Univ Life Sci, Warsaw, Poland
关键词
Information security policy; compliance; behavior; PROTECTION MOTIVATION; FEAR APPEALS; COMPLIANCE LEADERSHIP; NEUTRALIZATION; INSIGHTS; HABIT; DETERRENCE; FRAMEWORK; MORALITY; THREATS;
D O I
10.1080/08874417.2020.1779151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this paper was to first examine the reliability, validity, and strength of a unified model for information security policy compliance that includes eight constructs explaining information security policy compliance. Second, seven hypotheses were developed and tested based on the constructs in the model. An instrument with eight constructs was used to reflect the traditional survey statements method that measures current or retrospective behavior for the items of each construct. A sample of 187 faculty and staff from a mid-sized university in the USA participated in the study. Data were collected electronically and analyzed through SmartPLS 3.0, a partial least square structural equation modeling software. The results indicated strong support for the models' reliability, validity, and strength. The results also showed support for five hypotheses. Two hypotheses were rejected. The findings with implications are discussed. Recommendations for future research are made.
引用
收藏
页码:99 / 107
页数:9
相关论文
共 50 条
  • [31] A Unified Formal Model for Proving Security and Reliability Properties
    Hu, Wei
    Wu, Lingjuan
    Tai, Yu
    Tan, Jing
    Zhang, Jiliang
    2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 30 - 35
  • [32] The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions
    Chen, Lin
    Xie, Zongxiao
    Zhen, Jie
    Dong, Kunxiang
    PSYCHOLOGY RESEARCH AND BEHAVIOR MANAGEMENT, 2022, 15 : 1177 - 1191
  • [33] Reducing fraud in organizations through information security policy compliance: An information security controls perspective
    Brown, Dennis
    Batra, Gunjan
    Zafar, Humayun
    Saeed, Khawaja
    COMPUTERS & SECURITY, 2024, 144
  • [34] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [35] Information security policy compliance: a higher education case study
    Alshare, Khaled A.
    Lane, Peggy L.
    Lane, Michael R.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 91 - 108
  • [36] Social control through deterrence on the compliance with information security policy
    Choi, Myeonggil
    Song, Jeongseok
    SOFT COMPUTING, 2018, 22 (20) : 6765 - 6772
  • [37] Employees' information security policy compliance: A norm activation perspective
    Yazdanmehr, Adel
    Wang, Jingguo
    DECISION SUPPORT SYSTEMS, 2016, 92 : 36 - 46
  • [38] Information Security Policy Compliance: An Empirical Study of Ethical Ideology
    Al-Omari, Ahmad
    Deokar, Amit
    El-Gayar, Omar
    Walters, Jack
    Aleassa, Hasan
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3018 - 3027
  • [39] Designing an incentive mechanism for information security policy compliance: An experiment
    Li, Yuanxiang John
    Hoffman, Elizabeth
    JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 2023, 212 : 138 - 159
  • [40] Technostress and its influence on employee information security policy compliance
    Nasirpouri Shadbad, Forough
    Biros, David
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (01) : 119 - 141