Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness

نویسندگان

  • Burcu Bulgurcu
  • Hasan Cavusoglu
  • Izak Benbasat
چکیده

Frequency Percentage Has your employer established information security policies? Yes No 464 0 100 0 To what extent are you aware of the regulations prescribed by the information security policy (ISP) of your organization? 1 (Completely Unaware) 2 3 4 5 6 7 (Completely Aware) 0 0 50 87 101 114 112 0 0 11 19 22 24 24

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور

Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...

متن کامل

Information Security Policy Compliance: A User Acceptance Perspective

Compliance with information security policies (ISPs) is a key factor in reducing an organization’s information security risks. As such, understanding employees’ compliance behavior with ISPs is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study adapts the Technology Acceptance Model (TAM) to examine users’ behav...

متن کامل

Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale

Purpose – Employees’ compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security. Design/methodology/approach – This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a ...

متن کامل

Information Security Policy Compliance: An Empirical Study on Escalation of Commitment

This study aims to facilitate a new understanding on employees’ attitude towards compliance with the requirements of their information security policy (ISPs) through the lens of escalation. Escalation presents a situation in which employees must decide whether to persist in or withdraw from a non-performing task. Drawing on the Theory of Planned Behavior (TPB) and Agency Theory, our model delin...

متن کامل

Employee ISP Compliance Intentions: An Empirical Test of Empowerment

Incidents of computer abuse, proprietary information leaks and other security lapses have been on an increase. Most often, such security lapses are attributed to internal employees in organizations subverting established organizational information security policy (ISP). As employee compliance with ISP is the key to escalating information security breaches, understanding employee motivation for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • MIS Quarterly

دوره 34  شماره 

صفحات  -

تاریخ انتشار 2010