A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance

被引:0
|
作者
Sommestad, Teodor [1 ]
Hallberg, Jonas [1 ]
机构
[1] Swedish Def Res Agcy, Linkoping, Sweden
关键词
information security; security policy; security rule; policy compliance; policy violation; computer misuse; theory of planned behavior; REASONED ACTION; DETERRENCE; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The behaviour of employees influences information security in virtually all organisations. To inform the employees regarding what constitutes desirable behaviour, an information security policy can be formulated and communicated. However, not all employees comply with the information security policy. This paper reviews and synthesises 16 studies related to the theory of planned behaviour. The objective is to investigate 1) to what extent the theory explains information security policy compliance and violation and 2) whether reasonable explanations can be found when the results of the studies diverge. It can be concluded that the theory explains information security policy compliance and violation approximately as well as it explains other behaviours. Some potential explanations can be found for why the results of the identified studies diverge. However, many of the differences in results are left unexplained.
引用
收藏
页码:257 / 271
页数:15
相关论文
共 50 条
  • [21] Information Security Policy Compliance: Leadership and Trust
    Paliszkiewicz, Joanna
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) : 211 - 217
  • [22] Issues and Trends in Information Security Policy Compliance
    Bhaharin, Surayahani Hasnul
    Mokhtar, Umi Asma
    Sulaiman, Rossilawati
    Yusof, Maryati Mohd
    2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS: EMPOWERING DIGITAL INNOVATION (ICRIIS 2019), 2019,
  • [23] Predictors of Success in Information Security Policy Compliance
    Nord, Jeretta
    Sargent, Carol Springer
    Koohang, Alex
    Marotta, Angelica
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (04) : 863 - 873
  • [24] Behavioral Approach to Information Security Policy Compliance
    Mady, Ashraf
    Gupta, Saurabh
    AMCIS 2017 PROCEEDINGS, 2017,
  • [25] The role of norms in information security policy compliance
    Wiafe, Isaac
    Koranteng, Felix Nti
    Wiafe, Abigail
    Obeng, Emmanuel Nyarko
    Yaokumah, Winfred
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 743 - 761
  • [26] Psychological Capital and Information Security Policy Compliance
    Zhao, Jiaqing
    Hong, Yuxiang
    Chen, Wenqing
    Chen, Chouyong
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [27] Variables influencing information security policy compliance: A systematic review of quantitative studies
    Sommestad, T. (Teodor.Sommestad@foi.se), 1600, JAI Press (22):
  • [28] The theory of planned behaviour in the context of cultural heritage tourism
    Alonso, Abel Duarte
    Sakellarios, Nikolaos
    Pritchard, Mike
    JOURNAL OF HERITAGE TOURISM, 2015, 10 (04) : 399 - 416
  • [29] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [30] Improving tax compliance strategies: Can the theory of planned behaviour predict business compliance?
    Langham, Jo'Anne
    Paulsen, Neil
    Hartel, Charmine E. J.
    EJOURNAL OF TAX RESEARCH, 2012, 10 (02): : 364 - 402