A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance

被引:0
|
作者
Sommestad, Teodor [1 ]
Hallberg, Jonas [1 ]
机构
[1] Swedish Def Res Agcy, Linkoping, Sweden
关键词
information security; security policy; security rule; policy compliance; policy violation; computer misuse; theory of planned behavior; REASONED ACTION; DETERRENCE; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The behaviour of employees influences information security in virtually all organisations. To inform the employees regarding what constitutes desirable behaviour, an information security policy can be formulated and communicated. However, not all employees comply with the information security policy. This paper reviews and synthesises 16 studies related to the theory of planned behaviour. The objective is to investigate 1) to what extent the theory explains information security policy compliance and violation and 2) whether reasonable explanations can be found when the results of the studies diverge. It can be concluded that the theory explains information security policy compliance and violation approximately as well as it explains other behaviours. Some potential explanations can be found for why the results of the identified studies diverge. However, many of the differences in results are left unexplained.
引用
收藏
页码:257 / 271
页数:15
相关论文
共 50 条
  • [1] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [2] The sufficiency of the theory of planned behavior for explaining information security policy compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (02) : 200 - 217
  • [3] Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    Ifinedo, Princely
    COMPUTERS & SECURITY, 2012, 31 (01) : 83 - 95
  • [4] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [5] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [6] Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory
    Balozian, Puzant
    Leidner, Dorothy
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2017, 48 (03): : 11 - 43
  • [7] Information Security Policy Compliance: An Exploration of User Behaviour and Organizational Factors
    Angraini
    Alias, Rose Alinda
    Okfalisa
    ADVANCES ON INTELLIGENT INFORMATICS AND COMPUTING: HEALTH INFORMATICS, INTELLIGENT SYSTEMS, DATA SCIENCE AND SMART COMPUTING, 2022, 127 : 641 - 650
  • [8] Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour
    Trang, Simon
    Nastjuk, Ilja
    COMPUTERS & SECURITY, 2021, 104
  • [9] Using the Theory of Interpersonal Behavior to predict Information Security Policy Compliance
    Chin, Won Yoon
    Chua, Hui Na
    2021 EIGHT INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2021, : 80 - 87
  • [10] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,