Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
نویسندگان
چکیده
Employees’ failure to comply with IS security procedures is a key concern for organizations today. A number of socio-cognitive theories have been used to explain this. However, prior studies have not examined the influence of past and automatic behavior on employee decisions to comply. This is an important omission because past behavior has been assumed to strongly affect decision-making. To address this gap, we integrated habit (a routinized form of past behavior) with Protection Motivation Theory (PMT), to explain compliance. An empirical test showed that habitual IS security compliance strongly reinforced the cognitive processes theorized by PMT, as well as employee intention for future compliance. We also found that nearly all components of PMT significantly impacted employee intention to comply with IS security policies. Together, these results highlighted the importance of addressing employees’ past and automatic behavior in order to improve compliance. 2012 Elsevier B.V. All rights reserved. * Corresponding author. Tel.: +1 801 361 2531; fax: +1 509 275 0886. E-mail addresses: [email protected] (A. Vance), [email protected] (M. Siponen), [email protected] (S. Pahnila). URL: http://www.anthonyvance.com 1 http://www.issrc.oulu.fi/.
منابع مشابه
The sufficiency of the theory of planned behavior for explaining information security policy compliance
Purpose: The theory of planned behavior is an established theory that has been found to predict compliance with information security policies well. This paper challenges this assumption that the theory includes all constructs that explain information security policy compliance and investigates if anticipated regret or constructs from the protection motivation theory add explanatory power. Desig...
متن کاملMISQ Archivist An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and procedures. However, empirical assessments of the effectiveness of fear appeals have yielded mixed results, leading IS security scholars and practitioners to question the validity of the conventional fear appeal framework and ...
متن کاملProtection motivation and deterrence: a framework for security policy compliance in organisations
Received: 21 February 2008 Revised: 15 August 2008 2nd Revision: 31 January 2009 Accepted: 23 February 2009 Abstract Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is...
متن کاملWork Motivation: A Study on Regular and Part-time Employees of Bangladesh
Nowadays both part-time as well as regular employees are working in many organizations of Bangladesh. Though many studies have been conducted to know the motivation status of regular employees but no study is found that addressed motivations status of both regular and part-time employees of Bangladesh. Thus, this study is conducted on 300 regular and part-time employees of Bangladesh to know th...
متن کاملEmployees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory
The trend of bring your own device (BYOD) has been rapidly adopted by organizations. Despite the pros and cons of BYOD adoption, this trend is expected to inevitably keep increasing. Yet, BYOD has raised significant concerns about information system security as employees use their personal devices to access organizational resources. This study aims to examine employees' intention to comply with...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information & Management
دوره 49 شماره
صفحات -
تاریخ انتشار 2012