Out of Fear or Desire: Why do Employees Follow Information Systems Security Policies?

نویسندگان

  • Jai-Yeol Son
  • Hyeun-Suk Rhee
چکیده

Two well-grounded motivational models—command-and-control and self-regulation, which are viewed as competing explanations of why individuals follow rules (Tyler and Blader 2005)—are used as conceptual lenses through which to view employees’ adherence to information systems security policy (ISSP). Specifically, we aim to identify specific factors drawn from each of the two competing approaches that determine the level of employees’ adherence to their organization’s ISSP, and to develop and empirically test a conceptual model based on the two groups of determinants to be identified. Further, we will compare the relative efficacy of the two approaches to predict each of the two types of ISSP adherence behaviors. Our conceptual arguments will be tested with data to be collected via a survey in large-scale field studies. When completed, the results of this proposed study should contribute to the literature of corporate security management by advancing our knowledge of the central determinants of employees’ adherence to ISSP. Gaining such an understanding will also be managerially important because organizations can design more effective security training and education programs to promote their employees’ adherence behaviors related to ISSP.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: a Qualitative Study

Sensitive company information can leak to unauthorized parties in case employees do not perform effective protective measures while using application systems for their day-to-day tasks. To reduce the risks for such information leakage incidents, many companies require their employees to follow information systems (IS) security policies and promote awareness programs to increase IS security awar...

متن کامل

Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method

Employees’ poor compliance with information security policies is a perennial problem. Current information security analysis methods do not allow information security managers to capture the rationalities behind employees’ compliance and non-compliance. To address this shortcoming, this design science research paper suggests: (a) a Value-Based Compliance analysis method and (b) a set of design p...

متن کامل

If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security

Received: 8 April 2008 Revised: 15 August 2008 2nd Revision: 18 January 2009 Accepted: 23 February 2009 Abstract Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies a...

متن کامل

Learning from “Shadow Security:”

Over the past decade, security researchers and practitioners have tried to understand why employees do not comply with organizational security policies and mechanisms. Past research has treated compliance as a binary decision: people comply, or they do not. From our analysis of 118 in-depth interviews with individuals (employees in a large multinational organization) about security non-complian...

متن کامل

Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea

Since organizational information security policies can only improve security if employees comply with them, understanding the factors that affect employee security compliance is crucial for strengthening information security. Based on a survey with 200 German employees, we find that reward for production goal achievement negatively impacts security compliance. Whereas a distinct error aversion ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007