Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes
نویسندگان
چکیده
In an era of heightened sensitivity to issues of privacy or information security, concerns over policy compliance by all employees is of great importance. Many organizations are increasing the resources devoted to compliance training and efforts to inform employees of proper compliance behavior. Compliance by remote employees, however, is especially challenging as they are often not privy to the same resources provided of their in-house counterparts. Through a survey of over 500 remote and in-house employees, this study reveals factors that contribute to policy compliance and the discrepancies that exist between remote and in-house employees toward that goal. The findings reveal compliance intentions are significantly impacted by levels of awareness and self-efficacy, which are themselves influenced by the external cues of situational support, verbal persuasion, and vicarious experience. Further the findings suggest that there are significant differences in the awareness, self-efficacy, and compliance intention levels of remote and in-house employees.
منابع مشابه
Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness
Using social cognitive theory as a framework, this study proposes and tests a behavioral model to predict how “remote” status impacts the manner in which social learning cues influence employee awareness of information security policies and ultimately differentiates him or her from in-house employees in terms of information security policy awareness. Based on data acquired from an online sample...
متن کاملProtection motivation and deterrence: a framework for security policy compliance in organisations
Received: 21 February 2008 Revised: 15 August 2008 2nd Revision: 31 January 2009 Accepted: 23 February 2009 Abstract Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is...
متن کاملSupport Structures and Their Impacts on Employee Outcomes: A Longitudinal Field Study of an Enterprise System Implementation
MISQ 2010 Puhakainen and Siponen Email (implementation of IS security policy) Training The training program must provide necessary information to the educators, so the educators know the theory of how the training program helps people learn. In the case of IS security training, the underlying theories should not only explain how people learn, but also what learning principles are expected to ch...
متن کاملSocial Groupings and Information Security Obedience Within Organizations
Individuals’ compliance with information security policies is important for the overall security of organizations. It has been suggested that obedience cultures exist in organizations and that social processes and structures play a role for the compliance intentions and compliance behavior of individuals. This paper investigates if individuals’ compliance intention is more homogenous within soc...
متن کاملControl - Related Motivations and Information Security Policy Compliance : The Role of Autonomy and Efficacy
Employees' failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of ...
متن کامل