2019
DOI: 10.1016/j.procs.2019.11.235
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Policy Compliance: Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 46 publications
0
8
0
Order By: Relevance
“…The results showed that the general deterrence theory, theory of planned behavior (TPB) and protection motivation theory are the most frequently used in the field which concurs with [31,32]. The following paragraphs discuss the five most common theories in the studies; other theories are listed in Appendix Table 2 in detail.…”
Section: Rq1-what Are the Theories Used In The Information Security Policies Compliance Context? Rq2-what Is The Kind Of Relation Of Inflmentioning
confidence: 99%
See 1 more Smart Citation
“…The results showed that the general deterrence theory, theory of planned behavior (TPB) and protection motivation theory are the most frequently used in the field which concurs with [31,32]. The following paragraphs discuss the five most common theories in the studies; other theories are listed in Appendix Table 2 in detail.…”
Section: Rq1-what Are the Theories Used In The Information Security Policies Compliance Context? Rq2-what Is The Kind Of Relation Of Inflmentioning
confidence: 99%
“…A meta-analysis of 35 articles was conducted by Trang and Brendel [30] to explain the effect of deterrence theory towards ISPC. Angraini et al [31] conducted a study covering 59 articles to evaluate the existing theories in ISPC research. Kuppusamy et al [32] also identified several theories using 29 relevant articles.…”
Section: Motivations For the Current Studymentioning
confidence: 99%
“…Governance for information security can be identified as a process which deals with procedures and methods for monitoring information availability, accessibility, reliability, and safety and compliance with government policies [25,26]. The vital issue is it requires full commitment and support from the top management of the organization for the execution of information security management [27]. In an SC, the systems will be implemented in a single platform to aggregate data and manage SC initiatives.…”
Section: Citizen's Acceptancementioning
confidence: 99%
“…A key instrument to reduce information security threats is to create deploy and enforce information security policies (Jaeger et al, 2020). Information security policy is an internal document to ensure information asset and information technology security with a specific procedure to support the organization objectives (Angraini et al, 2019). A security policy includes a list if physical and technical safeguards, data processing locations, information on personal data processing software.…”
Section: Data Descriptionmentioning
confidence: 99%