Building an awareness-centered information security policy compliance model

被引:24
|
作者
Koohang, Alex [1 ]
Anderson, Jonathan [1 ]
Nord, Jeretta Horn [2 ]
Paliszkiewicz, Joanna [3 ]
机构
[1] Middle Georgia State Univ, Macon, GA 31206 USA
[2] Oklahoma State Univ, Stillwater, OK 74078 USA
[3] Warsaw Univ Life Sci, Dept Econ, Warsaw, Poland
关键词
Compliance; Leadership; Trust; Awareness; Information security policy; MANAGEMENT; TRUST; SYSTEMS; PERFORMANCE; LEADERSHIP; KNOWLEDGE; IMPACT; BEHAVIOR;
D O I
10.1108/IMDS-07-2019-0412
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose The purpose of this paper is to build an awareness-centered information security policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and that awareness depends upon several variables that influence successful ISP compliance. Design/methodology/approach The authors built a model with seven constructs, i.e., leadership, trusting beliefs, information security issues awareness (ISIA), ISP awareness, understanding resource vulnerability, self-efficacy (SE) and intention to comply. Seven hypotheses were stated. A sample of 285 non-management employees was used from various organizations in the USA. The authors used path modeling to analyze the data. Findings The findings indicated that IS awareness depends on effective organizational leadership and elevated employees' trusting beliefs. The understanding of resource vulnerability (URV) and SE are influenced by IS awareness resulting from effective leadership and elevated employees' trusting beliefs which guide employees to comply with ISP requirements. Originality/value This paper asserts that awareness is central to ISP compliance. Leadership and trusting beliefs variables play significant roles in the information security awareness which in turn positively affect employees' URV and SE variables leading employees to comply with the ISP requirements.
引用
收藏
页码:231 / 247
页数:17
相关论文
共 50 条
  • [21] Behavioral Approach to Information Security Policy Compliance
    Mady, Ashraf
    Gupta, Saurabh
    AMCIS 2017 PROCEEDINGS, 2017,
  • [22] The role of norms in information security policy compliance
    Wiafe, Isaac
    Koranteng, Felix Nti
    Wiafe, Abigail
    Obeng, Emmanuel Nyarko
    Yaokumah, Winfred
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 743 - 761
  • [23] Psychological Capital and Information Security Policy Compliance
    Zhao, Jiaqing
    Hong, Yuxiang
    Chen, Wenqing
    Chen, Chouyong
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [24] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [25] Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model
    Gundu, Tapiwa
    Modiba, Nthabiseng
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 569 - 576
  • [26] Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory
    Balozian, Puzant
    Leidner, Dorothy
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2017, 48 (03): : 11 - 43
  • [27] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [28] A model for information security vulnerability awareness
    Mejias, Roberto J.
    Greer, Joshua J.
    Greer, Gabrila C.
    Shepherd, Morgan M.
    Reyes, Raul Y.
    COMPUTERS & SECURITY, 2025, 151
  • [29] The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7690 - 7695
  • [30] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224