2018
DOI: 10.1108/ics-09-2017-0063
|View full text |Cite
|
Sign up to set email alerts
|

Establishing information security policy compliance culture in organizations

Abstract: Purpose This paper aims to establish that employees’ non-compliance with information security policy (ISP) could be addressed by nurturing ISP compliance culture through the promotion of factors such as supportive organizational culture, end-user involvement and compliance leadership to influence employees’ attitudes and behaviour intentions towards ISP in organizations. This paper also aims to develop a testable research model that might be useful for future researchers in predicting employees’ behavioural in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
35
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(36 citation statements)
references
References 39 publications
1
35
0
Order By: Relevance
“…(2015) , who confirmed the behavioral influence of attitude on the intention of employees to comply with information security policies, albeit qualitatively. Both Ifinedo (2014) and Amankwa et al. (2018) found that attitude displayed the most significant effect size on complying with information security policies.…”
Section: Research Model and Hypothesesmentioning
confidence: 99%
“…(2015) , who confirmed the behavioral influence of attitude on the intention of employees to comply with information security policies, albeit qualitatively. Both Ifinedo (2014) and Amankwa et al. (2018) found that attitude displayed the most significant effect size on complying with information security policies.…”
Section: Research Model and Hypothesesmentioning
confidence: 99%
“…Likewise, the research conducted by Arage [37], states that national culture has an impact on information security compliance. Another factor within the organization is user involvement and leadership, this potential was seen by Amankwa [38] in his research on Establishing information security policy compliance culture in organizations using the theory of organizational behavior and organization culture. However, differences in results found by Sommestad [36] investigated the relationship between individual intentions in social groups rather than the workplace and the effects of this group by using the theory of planned behavior and information security culture.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In a company with a stable culture, the appropriate policies and procedures, including sanctions and education programs regarding the policy, will be well implemented. Employee non-compliance with information security policies (ISP) can be overcome by maintaining an ISP compliance culture through organizational culture [38]. Further studies are needed to find out factors such as organizational culture to find out the involvement of organizational culture can influence compliance with security policies.…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…A frequently encountered statement, both in the literature of the subject and also among specialists dealing with data protection, the weakest element of information security is the human factor. It is the human inclination to make mistakes and adulteration and abuse that may result in the loss or disclosure of company information (Amankwa, Loock, Kritzinger, 2018;Pałęga, 2015;Palega, Knapinski, 2017). Nevertheless, in the belief of the authors of this publication, it is also the potential of human skills, capabilities, ideas, commitment and motivation of employees can be an effective defense against the failure of technical security.…”
Section: Introductionmentioning
confidence: 99%