Understanding the Incentive Mechanism of Penalty for Information Security Policy Compliance Behavior

被引:4
|
作者
Wang, Xiaolong [1 ,2 ]
Li, Wenli [1 ]
机构
[1] Dalian Univ Technol, Fac Management & Econ, Dalian 116024, Peoples R China
[2] Shandong Transport Vocat Coll, Dept Management & Informat, Weifang 261206, Peoples R China
基金
中国国家自然科学基金;
关键词
Incentive mechanism; Information security policy; Compliance behavior; Principal-agent model with moral hazard; Penalty; SYSTEMS SECURITY; MORAL HAZARD; DETERRENCE; MISUSE; ADHERENCE; THREATS; MODEL;
D O I
10.25236/ssehr.2018.005
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
A significant number of information security incidents have been attributed to the internal employees' failure to comply with the information security policy (ISP) in the organizational setting. There exists a principal-agent problem with moral hazard between the employer and the employee individual for the practical compliance effort of the employee is not observable without high costs. In this study, an ISP compliance game has been proposed to analyze the incentive mechanism of penalty on the compliance behavior of employee individual. It is shown that in a no-penalty contract, the employee will decline to comply with the ISP if the expected payoff obtained from her noncompliance is larger than that from the outside options; and in a penalty contract, an appropriate penalty will motivate her to exert the compliance effort level expected by her employer. A numerical example has been presented to show the validity of this game analysis.
引用
收藏
页码:19 / 25
页数:7
相关论文
共 50 条
  • [41] Information security policy compliance: a higher education case study
    Alshare, Khaled A.
    Lane, Peggy L.
    Lane, Michael R.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 91 - 108
  • [42] Employees' information security policy compliance: A norm activation perspective
    Yazdanmehr, Adel
    Wang, Jingguo
    DECISION SUPPORT SYSTEMS, 2016, 92 : 36 - 46
  • [43] Information Security Policy Compliance: An Empirical Study of Ethical Ideology
    Al-Omari, Ahmad
    Deokar, Amit
    El-Gayar, Omar
    Walters, Jack
    Aleassa, Hasan
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3018 - 3027
  • [44] Technostress and its influence on employee information security policy compliance
    Nasirpouri Shadbad, Forough
    Biros, David
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (01) : 119 - 141
  • [45] Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
    Buthelezi, Mokateko Portia
    Van der Poll, John Andrew
    Ochola, Elisha Oketch
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1360 - 1367
  • [46] Religiosity and Information Security Policy Compliance Completed Research Paper
    Borena, Berhanu
    Belanger, France
    AMCIS 2013 PROCEEDINGS, 2013,
  • [47] Validating and extending the unified model of information security policy compliance
    Gerdin, Marcus
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [48] Work-related groups and information security policy compliance
    Sommestad, Teodor
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (05) : 533 - 550
  • [49] Social control through deterrence on the compliance with information security policy
    Myeonggil Choi
    Jeongseok Song
    Soft Computing, 2018, 22 : 6765 - 6772
  • [50] Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
    Chen, Yan
    Ramamurthy, K.
    Wen, Kuang-Wei
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) : 157 - 188