Building an awareness-centered information security policy compliance model

被引:24
|
作者
Koohang, Alex [1 ]
Anderson, Jonathan [1 ]
Nord, Jeretta Horn [2 ]
Paliszkiewicz, Joanna [3 ]
机构
[1] Middle Georgia State Univ, Macon, GA 31206 USA
[2] Oklahoma State Univ, Stillwater, OK 74078 USA
[3] Warsaw Univ Life Sci, Dept Econ, Warsaw, Poland
关键词
Compliance; Leadership; Trust; Awareness; Information security policy; MANAGEMENT; TRUST; SYSTEMS; PERFORMANCE; LEADERSHIP; KNOWLEDGE; IMPACT; BEHAVIOR;
D O I
10.1108/IMDS-07-2019-0412
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose The purpose of this paper is to build an awareness-centered information security policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and that awareness depends upon several variables that influence successful ISP compliance. Design/methodology/approach The authors built a model with seven constructs, i.e., leadership, trusting beliefs, information security issues awareness (ISIA), ISP awareness, understanding resource vulnerability, self-efficacy (SE) and intention to comply. Seven hypotheses were stated. A sample of 285 non-management employees was used from various organizations in the USA. The authors used path modeling to analyze the data. Findings The findings indicated that IS awareness depends on effective organizational leadership and elevated employees' trusting beliefs. The understanding of resource vulnerability (URV) and SE are influenced by IS awareness resulting from effective leadership and elevated employees' trusting beliefs which guide employees to comply with ISP requirements. Originality/value This paper asserts that awareness is central to ISP compliance. Leadership and trusting beliefs variables play significant roles in the information security awareness which in turn positively affect employees' URV and SE variables leading employees to comply with the ISP requirements.
引用
收藏
页码:231 / 247
页数:17
相关论文
共 50 条
  • [1] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [2] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [3] Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness
    Koohang, Alex
    Nowak, Alojzy
    Paliszkiewicz, Joanna
    Nord, Jeretta Horn
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (01) : 1 - 8
  • [4] Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    Bulgurcu B.
    Cavusoglu H.
    Benbasat I.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 523 - 548
  • [5] INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED BELIEFS AND INFORMATION SECURITY AWARENESS
    Bulgurcu, Burcu
    Cavusoglu, Hasan
    Benbasat, Izak
    MIS QUARTERLY, 2010, 34 (03) : 523 - 548
  • [6] An Integrative Behavioral Model of Information Security Policy Compliance
    Kim, Sang Hoon
    Yang, Kyung Hoon
    Park, Sunyoung
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [7] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [8] Impact of employees' demographic characteristics on the awareness and compliance of information security policy in organizations
    Chua, Hui Na
    Wong, Siew Fan
    Low, Yeh Ching
    Chang, Younghoon
    TELEMATICS AND INFORMATICS, 2018, 35 (06) : 1770 - 1780
  • [9] A Model of Information Security Policy Compliance for Public Universities: A Conceptual Model
    Angraini
    Alias, Rose Alinda
    Okfalisa
    EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 : 810 - 818
  • [10] Validating and extending the unified model of information security policy compliance
    Gerdin, Marcus
    INFORMATION AND COMPUTER SECURITY, 2025, 33 (01) : 25 - 48