Predictors of Success in Information Security Policy Compliance

被引:5
|
作者
Nord, Jeretta [1 ]
Sargent, Carol Springer [2 ]
Koohang, Alex [2 ]
Marotta, Angelica [3 ]
机构
[1] Oklahoma State Univ, Stillwater, OK 74078 USA
[2] Middle Georgia State Univ, Macon, GA 31206 USA
[3] MIT, Sloan Sch Management, Cambridge, MA 02139 USA
关键词
Information security policy; compliance; leadership; supportive organizational culture; engagement; role values; BEHAVIOR; VIOLATIONS; MANAGEMENT; NEUTRALIZATION; LEADERSHIP; AWARENESS; BELIEFS; CULTURE; MODEL;
D O I
10.1080/08874417.2022.2067795
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this study is to build on the ISP compliance literature by creating a prediction model that includes four predictor variables, namely, leadership, supportive organizational culture, engagement, and role values with one dependent variable - ISP compliance. We then seek to find out which of the predictor variables are most influential in predicting ISP compliance. An instrument with 5 constructs was administered electronically to a diverse set of employees in the U.S.A. ranging in work experience from new hires to CEOs and from many industries. Collected data were analyzed using multiple regression analysis. The results showed that all predictor variables in the model were significant. Supportive organizational culture followed by role values offered the largest explanatory power of the four predictor variables. We discuss the implications of the findings and offer suggestions for future research opportunities.
引用
收藏
页码:863 / 873
页数:11
相关论文
共 50 条
  • [1] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [2] Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance
    Park, Minjung
    Chai, Sangmi
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4723 - 4731
  • [3] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [4] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [5] Information Security Policy Compliance: Leadership and Trust
    Paliszkiewicz, Joanna
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) : 211 - 217
  • [6] Issues and Trends in Information Security Policy Compliance
    Bhaharin, Surayahani Hasnul
    Mokhtar, Umi Asma
    Sulaiman, Rossilawati
    Yusof, Maryati Mohd
    2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS: EMPOWERING DIGITAL INNOVATION (ICRIIS 2019), 2019,
  • [7] Behavioral Approach to Information Security Policy Compliance
    Mady, Ashraf
    Gupta, Saurabh
    AMCIS 2017 PROCEEDINGS, 2017,
  • [8] The role of norms in information security policy compliance
    Wiafe, Isaac
    Koranteng, Felix Nti
    Wiafe, Abigail
    Obeng, Emmanuel Nyarko
    Yaokumah, Winfred
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 743 - 761
  • [9] Psychological Capital and Information Security Policy Compliance
    Zhao, Jiaqing
    Hong, Yuxiang
    Chen, Wenqing
    Chen, Chouyong
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [10] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946