2014
DOI: 10.1108/imcs-08-2012-0045
|View full text |Cite
|
Sign up to set email alerts
|

Variables influencing information security policy compliance

Abstract: Purpose: To identify variables that influence compliance with information security policies of organizations and to identify how important these variables are. Design/methodology/approach: A systematic review of empirical studies described in extant literature is performed. This review found 29 studies meeting its inclusion criterion. The investigated variables in these studies and the effect size reported for them were extracted and analysed. Findings: In the 29 studies more than 60 variables have been studie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
131
2

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 166 publications
(149 citation statements)
references
References 38 publications
1
131
2
Order By: Relevance
“…Communicating the certainty and severity of sanctions for security non-compliance has been considered as an effective management strategy to prevent security non-compliance. However, inconsistent findings of the impact of sanctions have been reported (Sommestad et al 2014). For example, fear of penalties for noncompliance has been found to have a significant impact on security behaviour Rao 2009a, Kankanhalli et al 2003).…”
Section: Factor 3: Formal Security Compliance Evaluationmentioning
confidence: 95%
See 4 more Smart Citations
“…Communicating the certainty and severity of sanctions for security non-compliance has been considered as an effective management strategy to prevent security non-compliance. However, inconsistent findings of the impact of sanctions have been reported (Sommestad et al 2014). For example, fear of penalties for noncompliance has been found to have a significant impact on security behaviour Rao 2009a, Kankanhalli et al 2003).…”
Section: Factor 3: Formal Security Compliance Evaluationmentioning
confidence: 95%
“…These theories have been found to affect security compliance to some extent in the aggregate. However, most quantitative studies did not examine whether average end-users and security experts/managers complied differently (Sommestad et al 2014). In this case aggregate data cannot adequately inform management decision making because the aggregate user is a nonexistent artefact of statistics, such as is derived when gender results are averaged to produce a mean that is neither male nor female.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations