2022
DOI: 10.1080/08874417.2022.2067795
|View full text |Cite
|
Sign up to set email alerts
|

Predictors of Success in Information Security Policy Compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…To starve security best practices is to starve innovation (Cooney et al ., 2022). Leaders must support the BDA team as they create a robust information security policy and insist on compliance with those policies (Nord et al ., 2022).…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…To starve security best practices is to starve innovation (Cooney et al ., 2022). Leaders must support the BDA team as they create a robust information security policy and insist on compliance with those policies (Nord et al ., 2022).…”
Section: Discussionmentioning
confidence: 99%
“…Strong BDA talent quality personnel would be expected to have quality management processes to address privacy, security, availability, response time, and system reliability (Cohen and Levinthal, 1990;Grover et al, 2018;Ji-fan Ren et al, 2017). Since BDA projects are often multi-disciplinary, functional managers as co-creators and beneficiaries of BDA innovations would be expected to advocate strongly for policies that protect data assets and act as role models with high expectations about compliance (Nord et al, 2022). Given the collaborative nature of BDA talent quality tasks, messages about how to address security and privacy threats, risks, and vulnerabilities would likely be shared by the BDA talent quality personnel and valued firm-wide, increasing organizational BDA system quality (Ji-fan Ren et al, 2017;Nord et al, 2022).…”
Section: Bda Security Quality and Privacy Qualitymentioning
confidence: 99%
See 1 more Smart Citation
“…Insider threats are manifested when “human behaviour departs from compliance with established policies”, regardless of whether the insider threat emanates from an intentional or unintentional source (Greitzer et al , 2008, p. 61). More research is needed on the determinants that influence information security compliant behaviour, as this can help provide an additional layer of defence against information security threats (Nord et al , 2022). Additionally, these defensive measures should be underpinned by insider profiles (McBride et al , 2012).…”
Section: Introductionmentioning
confidence: 99%