A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance

被引:0
|
作者
Sommestad, Teodor [1 ]
Hallberg, Jonas [1 ]
机构
[1] Swedish Def Res Agcy, Linkoping, Sweden
关键词
information security; security policy; security rule; policy compliance; policy violation; computer misuse; theory of planned behavior; REASONED ACTION; DETERRENCE; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The behaviour of employees influences information security in virtually all organisations. To inform the employees regarding what constitutes desirable behaviour, an information security policy can be formulated and communicated. However, not all employees comply with the information security policy. This paper reviews and synthesises 16 studies related to the theory of planned behaviour. The objective is to investigate 1) to what extent the theory explains information security policy compliance and violation and 2) whether reasonable explanations can be found when the results of the studies diverge. It can be concluded that the theory explains information security policy compliance and violation approximately as well as it explains other behaviours. Some potential explanations can be found for why the results of the identified studies diverge. However, many of the differences in results are left unexplained.
引用
收藏
页码:257 / 271
页数:15
相关论文
共 50 条
  • [31] Application of the Theory of Planned Behaviour in Information Technology Governance
    Teo, Wil Ly
    Abd Manaf, Azizah
    Choong, Phyllis Lai Fong
    VISION 2020: INNOVATION, DEVELOPMENT SUSTAINABILITY, AND ECONOMIC GROWTH, VOLS 1-3, 2013, : 1084 - 1098
  • [32] The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7690 - 7695
  • [33] Exploring the factors influencing information security policy compliance and violations: A systematic literature review
    Balagopal, N.
    Mathew, Saji K.
    COMPUTERS & SECURITY, 2024, 147
  • [34] Dual Routes of Training on Information Security Policy Compliance
    Chen, Qiuyu
    Hong, Yuxiang
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [35] An Integrative Behavioral Model of Information Security Policy Compliance
    Kim, Sang Hoon
    Yang, Kyung Hoon
    Park, Sunyoung
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [36] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [37] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [38] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [39] Promoting Information Security Policy Compliance - An Empirical Study
    Li, Lei
    Han, Meng
    AMCIS 2020 PROCEEDINGS, 2020,
  • [40] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409