Measuring information security policy compliance: content validity of questionnaire

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Security Policy Compliance: The Role of Information Security Awareness

Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Th...

متن کامل

Information Security Policy Compliance: An Ethical Perspective

Ethical issues are key factors with respect to compliance intention with information security policies (ISPs). As such, understanding employees’ compliance behavior with ISPs from ethical lenses is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study proposes an integrated model that combines the Theory of Reasone...

متن کامل

Checking Security Policy Compliance

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. ...

متن کامل

An Integrative Behavioral Model of Information Security Policy Compliance

The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to d...

متن کامل

Toward a Unified Model of Information Security Policy Compliance

Mattila is a mid-level manager in a medium-sized business where he has worked for several years. Mattila is currently working on a sales report that requires the analysis of the company’s customer database, which contains sensitive financial and purchase history information. Because of the sensitive nature of the corporate data, the company has a strict policy prohibiting the copy of corporate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2021

ISSN: 2502-4760,2502-4752

DOI: 10.11591/ijeecs.v22.i1.pp469-475