The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
نویسندگان
چکیده
Received: 29 September 2009 Revised: 19 April 2010 2nd Revision: 5 July 2010 3rd Revision: 30 November 2010 Accepted: 8 December 2010 Abstract Throughout the world, sensitive personal information is now protected by regulatory requirements that have translated into significant new compliance oversight responsibilities for IT managers who have a legal mandate to ensure that individual employees are adequately prepared and motivated to observe policies and procedures designed to ensure compliance. This research project investigates the antecedents of information privacy policy compliance efficacy by individuals. Using Health Insurance Portability and Accountability Act compliance within the healthcare industry as a practical proxy for general organizational privacy policy compliance, the results of this survey of 234 healthcare professionals indicate that certain social conditions within the organizational setting (referred to as external cues and comprising situational support, verbal persuasion, and vicarious experience) contribute to an informal learning process. This process is distinct from the formal compliance training procedures and is shown to influence employee perceptions of efficacy to engage in compliance activities, which contributes to behavioural intention to comply with information privacy policies. Implications for managers and researchers are discussed. European Journal of Information Systems (2011) 20, 267–284. doi:10.1057/ejis.2010.72; published online 25 January 2011
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملReigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes
In an era of heightened sensitivity to issues of privacy or information security, concerns over policy compliance by all employees is of great importance. Many organizations are increasing the resources devoted to compliance training and efforts to inform employees of proper compliance behavior. Compliance by remote employees, however, is especially challenging as they are often not privy to th...
متن کاملEngaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness
Using social cognitive theory as a framework, this study proposes and tests a behavioral model to predict how “remote” status impacts the manner in which social learning cues influence employee awareness of information security policies and ultimately differentiates him or her from in-house employees in terms of information security policy awareness. Based on data acquired from an online sample...
متن کاملIdentifying the Factors Affecting Ethical Entrepreneurship Intention
Background: Entrepreneurship as a pillar of the development process in society derives from a socio-cultural context and ethics as a dimension of culture has a vibrant role in entrepreneurship. Therefore, the present study was designed to identify the factors that influence ethical entrepreneurial intention. Method: A qualitative research approach was conducted using the data base method. The...
متن کاملCompliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff
The employment of Electronic Medical Records is expected to better enhance health care quality and to relieve increased financial pressure. Electronic Medical Records are, however, potentially vulnerable to security breaches that may result in a rise of patients’ privacy concerns. The purpose of our study was to explore the factors that motivate hospital information technology staff’s complianc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EJIS
دوره 20 شماره
صفحات -
تاریخ انتشار 2011