Measuring information security policy compliance: content validity of questionnaire
نویسندگان
چکیده
منابع مشابه
Information Security Policy Compliance: The Role of Information Security Awareness
Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Th...
متن کاملInformation Security Policy Compliance: An Ethical Perspective
Ethical issues are key factors with respect to compliance intention with information security policies (ISPs). As such, understanding employees’ compliance behavior with ISPs from ethical lenses is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study proposes an integrated model that combines the Theory of Reasone...
متن کاملChecking Security Policy Compliance
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. ...
متن کاملAn Integrative Behavioral Model of Information Security Policy Compliance
The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to d...
متن کاملToward a Unified Model of Information Security Policy Compliance
Mattila is a mid-level manager in a medium-sized business where he has worked for several years. Mattila is currently working on a sales report that requires the analysis of the company’s customer database, which contains sensitive financial and purchase history information. Because of the sensitive nature of the corporate data, the company has a strict policy prohibiting the copy of corporate ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2021
ISSN: 2502-4760,2502-4752
DOI: 10.11591/ijeecs.v22.i1.pp469-475