Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study
نویسندگان
چکیده
It is widely agreed that a key threat to information security is caused by careless employees who do not adhere to the information security policies of their organizations. In order to ensure that employees comply with the organization’s information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has, however, criticized these measures as lacking theoretically and empirically grounded principles. To fill this gap in research, the present study advances a novel model that explains employees’ adherence to information security policies. This model modifies and combines the Protection Motivation Theory, the General Deterrence Theory, the Theory of Reasoned Action, the Innovation Diffusion Theory and Rewards. In order to empirically validate this model, we collected data (N=917) from four different companies. The findings show that direct paths from threat appraisal, self-efficacy, normative beliefs, and visibility to the intention to comply with IS security policies were significant. Response efficacy, on the other hand, did not have a significant effect on the intention to comply with IS security policies. Sanctions have a significant effect on actual compliance with IS security policies, whereas rewards did not have a significant effect on actual compliance with the IS security policies. Finally, the intention to comply with IS security policies has a significant effect on actual compliance with the IS security policies.
منابع مشابه
Employees' Adherence to Information Security Policies: An Empirical Study
The key threat to information security is constituted by careless employees who do not comply with information security policies. To ensure that employees comply with organizations’ information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has criticized these measures as lacking theoretically and empirically grou...
متن کاملOut of Fear or Desire: Why do Employees Follow Information Systems Security Policies?
Two well-grounded motivational models—command-and-control and self-regulation, which are viewed as competing explanations of why individuals follow rules (Tyler and Blader 2005)—are used as conceptual lenses through which to view employees’ adherence to information systems security policy (ISSP). Specifically, we aim to identify specific factors drawn from each of the two competing approaches t...
متن کاملUnderstanding the Antecedents of Information Security Awareness - An Empirical Study
Employees’ information security awareness (ISA) is a key antecedent of information security behavior. However, to date we know very little about the factors that are responsible for some employees having a higher level of ISA than others. Our study addresses this gap. We propose a model that comprises institutional, individual, and environmental factors preceding ISA. The model was empirically ...
متن کاملExploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: a Qualitative Study
Sensitive company information can leak to unauthorized parties in case employees do not perform effective protective measures while using application systems for their day-to-day tasks. To reduce the risks for such information leakage incidents, many companies require their employees to follow information systems (IS) security policies and promote awareness programs to increase IS security awar...
متن کاملAn Empirical Study about Why Dissatisfaction Arises Among the Employees and What It Consequences: Bangladesh Perspective
This article aimed at identifying the rate of dissatisfied employees who had left their previous jobs and the main factors which caused their dissatisfaction. In order to collect data for this study a well-structured questionnaire was distributed to 150 employees of different private and public organizations in Bangladesh who already left their previous jobs and 142 usable responses were rec...
متن کامل