Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes

نویسندگان

  • Allen C. Johnston
  • Barbara Wech
  • Eric Jack
  • Micah Beavers
چکیده

In an era of heightened sensitivity to issues of privacy or information security, concerns over policy compliance by all employees is of great importance. Many organizations are increasing the resources devoted to compliance training and efforts to inform employees of proper compliance behavior. Compliance by remote employees, however, is especially challenging as they are often not privy to the same resources provided of their in-house counterparts. Through a survey of over 500 remote and in-house employees, this study reveals factors that contribute to policy compliance and the discrepancies that exist between remote and in-house employees toward that goal. The findings reveal compliance intentions are significantly impacted by levels of awareness and self-efficacy, which are themselves influenced by the external cues of situational support, verbal persuasion, and vicarious experience. Further the findings suggest that there are significant differences in the awareness, self-efficacy, and compliance intention levels of remote and in-house employees.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness

Using social cognitive theory as a framework, this study proposes and tests a behavioral model to predict how “remote” status impacts the manner in which social learning cues influence employee awareness of information security policies and ultimately differentiates him or her from in-house employees in terms of information security policy awareness. Based on data acquired from an online sample...

متن کامل

Protection motivation and deterrence: a framework for security policy compliance in organisations

Received: 21 February 2008 Revised: 15 August 2008 2nd Revision: 31 January 2009 Accepted: 23 February 2009 Abstract Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is...

متن کامل

Support Structures and Their Impacts on Employee Outcomes: A Longitudinal Field Study of an Enterprise System Implementation

MISQ 2010 Puhakainen and Siponen Email (implementation of IS security policy) Training The training program must provide necessary information to the educators, so the educators know the theory of how the training program helps people learn. In the case of IS security training, the underlying theories should not only explain how people learn, but also what learning principles are expected to ch...

متن کامل

Social Groupings and Information Security Obedience Within Organizations

Individuals’ compliance with information security policies is important for the overall security of organizations. It has been suggested that obedience cultures exist in organizations and that social processes and structures play a role for the compliance intentions and compliance behavior of individuals. This paper investigates if individuals’ compliance intention is more homogenous within soc...

متن کامل

Control - Related Motivations and Information Security Policy Compliance : The Role of Autonomy and Efficacy

Employees' failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010