Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
نویسندگان
چکیده
Frequency Percentage Has your employer established information security policies? Yes No 464 0 100 0 To what extent are you aware of the regulations prescribed by the information security policy (ISP) of your organization? 1 (Completely Unaware) 2 3 4 5 6 7 (Completely Aware) 0 0 50 87 101 114 112 0 0 11 19 22 24 24
منابع مشابه
امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملInformation Security Policy Compliance: A User Acceptance Perspective
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s information security risks. As such, understanding employees’ compliance behavior with ISPs is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study adapts the Technology Acceptance Model (TAM) to examine users’ behav...
متن کاملSocial action theory for understanding information security non-compliance in hospitals: The importance of user rationale
Purpose – Employees’ compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security. Design/methodology/approach – This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a ...
متن کاملInformation Security Policy Compliance: An Empirical Study on Escalation of Commitment
This study aims to facilitate a new understanding on employees’ attitude towards compliance with the requirements of their information security policy (ISPs) through the lens of escalation. Escalation presents a situation in which employees must decide whether to persist in or withdraw from a non-performing task. Drawing on the Theory of Planned Behavior (TPB) and Agency Theory, our model delin...
متن کاملEmployee ISP Compliance Intentions: An Empirical Test of Empowerment
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an increase. Most often, such security lapses are attributed to internal employees in organizations subverting established organizational information security policy (ISP). As employee compliance with ISP is the key to escalating information security breaches, understanding employee motivation for ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- MIS Quarterly
دوره 34 شماره
صفحات -
تاریخ انتشار 2010