Predictors of Success in Information Security Policy Compliance

被引:5
|
作者
Nord, Jeretta [1 ]
Sargent, Carol Springer [2 ]
Koohang, Alex [2 ]
Marotta, Angelica [3 ]
机构
[1] Oklahoma State Univ, Stillwater, OK 74078 USA
[2] Middle Georgia State Univ, Macon, GA 31206 USA
[3] MIT, Sloan Sch Management, Cambridge, MA 02139 USA
关键词
Information security policy; compliance; leadership; supportive organizational culture; engagement; role values; BEHAVIOR; VIOLATIONS; MANAGEMENT; NEUTRALIZATION; LEADERSHIP; AWARENESS; BELIEFS; CULTURE; MODEL;
D O I
10.1080/08874417.2022.2067795
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this study is to build on the ISP compliance literature by creating a prediction model that includes four predictor variables, namely, leadership, supportive organizational culture, engagement, and role values with one dependent variable - ISP compliance. We then seek to find out which of the predictor variables are most influential in predicting ISP compliance. An instrument with 5 constructs was administered electronically to a diverse set of employees in the U.S.A. ranging in work experience from new hires to CEOs and from many industries. Collected data were analyzed using multiple regression analysis. The results showed that all predictor variables in the model were significant. Supportive organizational culture followed by role values offered the largest explanatory power of the four predictor variables. We discuss the implications of the findings and offer suggestions for future research opportunities.
引用
收藏
页码:863 / 873
页数:11
相关论文
共 50 条
  • [21] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [22] Information security policy compliance: a replication study in Ethiopia
    Aebissa, Berhanu
    Dhillon, Gurpreet
    Meshesha, Million
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [23] Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation
    Brooks, Ricardo R. R.
    Williams, Kevin J. J.
    Lee, So-Yun
    JOURNAL OF BUSINESS AND PSYCHOLOGY, 2024, 39 (03) : 657 - 677
  • [24] Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective
    Al Nuaim, Abdullah
    Ramirez, Ronald
    Dincelli, Ersin
    AMCIS 2020 PROCEEDINGS, 2020,
  • [25] Information Security Policy Compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
    Alzahrani, Ahmed
    Johnson, Chris
    Altamimi, Saad
    2018 4TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2018), 2018, : 125 - 132
  • [26] The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions
    Chen, Lin
    Xie, Zongxiao
    Zhen, Jie
    Dong, Kunxiang
    PSYCHOLOGY RESEARCH AND BEHAVIOR MANAGEMENT, 2022, 15 : 1177 - 1191
  • [27] Reducing fraud in organizations through information security policy compliance: An information security controls perspective
    Brown, Dennis
    Batra, Gunjan
    Zafar, Humayun
    Saeed, Khawaja
    COMPUTERS & SECURITY, 2024, 144
  • [28] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [29] Information security policy compliance: a higher education case study
    Alshare, Khaled A.
    Lane, Peggy L.
    Lane, Michael R.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 91 - 108
  • [30] Social control through deterrence on the compliance with information security policy
    Choi, Myeonggil
    Song, Jeongseok
    SOFT COMPUTING, 2018, 22 (20) : 6765 - 6772