Variables influencing information security policy compliance: A systematic review of quantitative studies

نویسندگان

  • Teodor Sommestad
  • Jonas Hallberg
  • Kristoffer Lundholm
  • Johan E. Bengtsson
چکیده

Purpose: To identify variables that influence compliance with information security policies of organizations and to identify how important these variables are. Design/methodology/approach: A systematic review of empirical studies described in extant literature is performed. This review found 29 studies meeting its inclusion criterion. The investigated variables in these studies and the effect size reported for them were extracted and analysed. Findings: In the 29 studies more than 60 variables have been studied in relation to security policy compliance and incompliance. Unfortunately, no clear winners can be found among the variables or the theories they are drawn from. Each of the variables only explain a small part of the variation in people’s behaviour and when a variable has been investigated in multiple studies the findings often show a considerable variation. Research limitations/implications: It is possible that the disparate findings of the reviewed studies can be explained by the sampling methods used in the studies, the treatment/control of extraneous variables and interplay between variables. These aspects ought to be addressed in future research efforts Practical implications: For decision makers who seek guidance on how to best achieve compliance with their information security policies should recognize that a large number of variables probably influence employees’ compliance. In addition, both their influence strength and interplay is uncertain and largely unknown. Originality/value: This is the first systematic review of research on variables that influence compliance with information security policies of organizations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Factors Influencing the Use of Prenatal Care: A Systematic Review

Background & aim: Prenatal care is a key strategy for achieving public health goals, primary healthcare objectives, and the Millennium Development Goals. The aim of this study was to investigate the factors influencing the use of prenatal care services in order to design suitable interventions and promote the use of these services. Methods:In this systematic quantitative literature review, stud...

متن کامل

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature

A rich stream of research has identified numerous antecedents to employee compliance with information security policies. However, the breadth of this literature and inconsistencies in the reported findings warrants a more in-depth analysis. Drawing on 25 quantitative studies focusing on security policy compliance, we classified 105 independent variables into 17 distinct categories. We conducted...

متن کامل

امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور

Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...

متن کامل

Delving Into the Details of Evaluating Public Engagement Initiatives; Comment on “Metrics and Evaluation Tools for Patient Engagement in Healthcare Organization- and System-Level Decision-Making: A Systematic Review”

Initiatives to engage the public in health policy decisions have been widely endorsed and used, yet agreed upon methods for systematically evaluating the effectiveness of these initiatives remain to be developed. Dukhanin, Topazian, and DeCamp have thus developed a useful taxonomy of evaluation criteria derived from a systematic review of published evaluation tools that might serve as the basis...

متن کامل

Systematic Review and Meta-Analysis of IS Security Policy Compliance Research. First Steps towards Evidence-Based Structuring of the IS Security Domain

Given the short supply of empiricism in ISS research, existing empirical evidence needs to be processed further than the scope of a single paper may allow. Other fields of science have long recognized the need for higher level analyses of research results in order to make them accessible to practitioners and develop a knowledge base. In our paper we perform an exhaustive literature research in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Manag. Comput. Security

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2014