Building an awareness-centered information security policy compliance model

被引:24
|
作者
Koohang, Alex [1 ]
Anderson, Jonathan [1 ]
Nord, Jeretta Horn [2 ]
Paliszkiewicz, Joanna [3 ]
机构
[1] Middle Georgia State Univ, Macon, GA 31206 USA
[2] Oklahoma State Univ, Stillwater, OK 74078 USA
[3] Warsaw Univ Life Sci, Dept Econ, Warsaw, Poland
关键词
Compliance; Leadership; Trust; Awareness; Information security policy; MANAGEMENT; TRUST; SYSTEMS; PERFORMANCE; LEADERSHIP; KNOWLEDGE; IMPACT; BEHAVIOR;
D O I
10.1108/IMDS-07-2019-0412
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose The purpose of this paper is to build an awareness-centered information security policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and that awareness depends upon several variables that influence successful ISP compliance. Design/methodology/approach The authors built a model with seven constructs, i.e., leadership, trusting beliefs, information security issues awareness (ISIA), ISP awareness, understanding resource vulnerability, self-efficacy (SE) and intention to comply. Seven hypotheses were stated. A sample of 285 non-management employees was used from various organizations in the USA. The authors used path modeling to analyze the data. Findings The findings indicated that IS awareness depends on effective organizational leadership and elevated employees' trusting beliefs. The understanding of resource vulnerability (URV) and SE are influenced by IS awareness resulting from effective leadership and elevated employees' trusting beliefs which guide employees to comply with ISP requirements. Originality/value This paper asserts that awareness is central to ISP compliance. Leadership and trusting beliefs variables play significant roles in the information security awareness which in turn positively affect employees' URV and SE variables leading employees to comply with the ISP requirements.
引用
收藏
页码:231 / 247
页数:17
相关论文
共 50 条
  • [31] Dual Routes of Training on Information Security Policy Compliance
    Chen, Qiuyu
    Hong, Yuxiang
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [32] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [33] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [34] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [35] Promoting Information Security Policy Compliance - An Empirical Study
    Li, Lei
    Han, Meng
    AMCIS 2020 PROCEEDINGS, 2020,
  • [36] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [37] Information security policy compliance: a replication study in Ethiopia
    Aebissa, Berhanu
    Dhillon, Gurpreet
    Meshesha, Million
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [38] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [39] Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective
    Al Nuaim, Abdullah
    Ramirez, Ronald
    Dincelli, Ersin
    AMCIS 2020 PROCEEDINGS, 2020,
  • [40] Information Security Policy Compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
    Alzahrani, Ahmed
    Johnson, Chris
    Altamimi, Saad
    2018 4TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2018), 2018, : 125 - 132