Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance

被引:12
|
作者
Koohang, Alex [1 ]
Nord, Jeretta Horn [2 ]
Sandoval, Zoroayka, V [1 ]
Paliszkiewicz, Joanna [3 ]
机构
[1] Middle Georgia State Univ, Macon, GA USA
[2] Oklahoma State Univ, Stillwater, OK 74078 USA
[3] Warsaw Univ Life Sci, Warsaw, Poland
关键词
Information security policy; compliance; behavior; PROTECTION MOTIVATION; FEAR APPEALS; COMPLIANCE LEADERSHIP; NEUTRALIZATION; INSIGHTS; HABIT; DETERRENCE; FRAMEWORK; MORALITY; THREATS;
D O I
10.1080/08874417.2020.1779151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this paper was to first examine the reliability, validity, and strength of a unified model for information security policy compliance that includes eight constructs explaining information security policy compliance. Second, seven hypotheses were developed and tested based on the constructs in the model. An instrument with eight constructs was used to reflect the traditional survey statements method that measures current or retrospective behavior for the items of each construct. A sample of 187 faculty and staff from a mid-sized university in the USA participated in the study. Data were collected electronically and analyzed through SmartPLS 3.0, a partial least square structural equation modeling software. The results indicated strong support for the models' reliability, validity, and strength. The results also showed support for five hypotheses. Two hypotheses were rejected. The findings with implications are discussed. Recommendations for future research are made.
引用
收藏
页码:99 / 107
页数:9
相关论文
共 50 条
  • [41] Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
    Buthelezi, Mokateko Portia
    Van der Poll, John Andrew
    Ochola, Elisha Oketch
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1360 - 1367
  • [42] Religiosity and Information Security Policy Compliance Completed Research Paper
    Borena, Berhanu
    Belanger, France
    AMCIS 2013 PROCEEDINGS, 2013,
  • [43] Work-related groups and information security policy compliance
    Sommestad, Teodor
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (05) : 533 - 550
  • [44] Social control through deterrence on the compliance with information security policy
    Myeonggil Choi
    Jeongseok Song
    Soft Computing, 2018, 22 : 6765 - 6772
  • [45] Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
    Chen, Yan
    Ramamurthy, K.
    Wen, Kuang-Wei
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) : 157 - 188
  • [46] Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud
    Brown, Dennis
    Zafar, Humayun
    AMCIS 2017 PROCEEDINGS, 2017,
  • [47] Inconsistencies Between Information Security Policy Compliance and Shadow IT Usage
    Huang, Hsieh-Hong
    Lin, Jian-Wei
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024, 64 (04) : 554 - 564
  • [48] Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    Bulgurcu B.
    Cavusoglu H.
    Benbasat I.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 523 - 548
  • [49] INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED BELIEFS AND INFORMATION SECURITY AWARENESS
    Bulgurcu, Burcu
    Cavusoglu, Hasan
    Benbasat, Izak
    MIS QUARTERLY, 2010, 34 (03) : 523 - 548
  • [50] Impact of Security-related Stress and Affective Distress on Information Security Policy Compliance
    Bao Quoc Duong
    AMCIS 2020 PROCEEDINGS, 2020,