Predicting communication constructs towards determining information security policies compliance

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Factors influencing Non-Compliance behavior towards Information Security Policies

IT organizations and CEO‟s are, and should be, concerned these days about the (lack of) data confidentiality and the usage of „shadow‟ IT systems by employees. Not only does the company risk monetary loss or public embarrassment, the senior management might also risk personal fines or even imprisonment. Several trends reinforce the attention for these subjects, including the fact that an increa...

متن کامل

Information Security Policies Compliance: The Role of Organizational Punishment

It has been argued that organizational punishment serves as a deterrent to unwanted employee behavior but there is no clear consensus on the influence of punitive actions on employees’ behavior to comply with information security policies. This study proposes a model that explains the influence of organizational punishment on employees’ cognitive beliefs and their intention to comply with infor...

متن کامل

Towards Formal Security Analysis of Decentralized Information Flow Control Policies

Decentralized information flow control (DIFC) is a key innovation of traditional information flow control (IFC). Compared with IFC, DIFC provides new features including decentralized declassification, taint-tracking, and privilege-transferring. These characteristics also make DIFC able to achieve more fine-grained security goals. However, the flexibility of DIFC also presents challenges to its ...

متن کامل

Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method

Employees’ poor compliance with information security policies is a perennial problem. Current information security analysis methods do not allow information security managers to capture the rationalities behind employees’ compliance and non-compliance. To address this shortcoming, this design science research paper suggests: (a) a Value-Based Compliance analysis method and (b) a set of design p...

متن کامل

Influence of National Culture on Employees' Compliance with Information Systems Security (ISS) Policies: Towards ISS Culture in Ethiopian Companies

Nowadays, IS security is one of the most basic issues that organizations need to focus on. Despite huge investment made by companies to keep their systems safe, there are many security breaches, often caused by insiders. Most investments in security are for technological solutions; however, they are often insufficient and the literature suggests there is one significant element that has been gi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SA Journal of Information Management

سال: 2020

ISSN: 1560-683X,2078-1865

DOI: 10.4102/sajim.v22i1.1211