End-user IT Security Policy Compliance: A Confidence-Building Measures Approach

نویسنده

  • Emmanuel Ayaburi
چکیده

Corporate information systems security managers are continuously investing in the latest technical security tools to make their defenses against internal and external attacks on their information systems effective and efficient. However, these technical tools do not provide complete protection and organizations are experiencing a rise in security breaches. The cause of some security breaches are attributed to the actions of employees within the organization. Based on literature in international relations, this study advances four propositions to explain how end-user compliance with organizational information security policy (ISP) can be achieved using a confidence-building measures approach. The set of four propositions developed involve trust, prior notification of information system security initiative(s), disclosure of observed non-compliant behavior and promotion of compliant behavior. A laboratory experiment has been proposed as a methodology to assess these propositions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security compliance-New insight from Goal orientations and Self-regulation theory

This paper explores how self-set security goal orientations and self-regulation theory can provide potential venues to motivate end-user sustained IS security compliance. Organisations have found that it is essential to motivate end-users to comply with information security measures and policies on a regular basis. The research aims to obtain an understanding of the relationship between individ...

متن کامل

Verifying Compliance of Trusted Programs

In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe operations despite have the authority to perform unsafe operations; for example, initialization programs, administrative programs, root network daemons, etc. Currently, these programs are trusted without concrete justi...

متن کامل

Contradictions in brilliant eyes

With the emergence of an international information policy regime1 over the last few decades, information policy tools have received more attention per se, multiplied in form, and penetrated a growing variety of realms of activity. Their use has been striking in the defense arena, where 85-95% of arms control agreements are now devoted to the compelled information collection, processing, and flo...

متن کامل

Causes of Judicial and Legal Criminal Policy Disagreement in Drug-Related Offenses from the Legal-Ethical Approach

Background: The legislative review of the criminal record on the crime of repetition and the severity of the punishment for repeated offenders indicates that the legislator firstly used various laws to include repetition of crime, and in some cases such as drug offenses and for criminal reasons. It has taken into account a certain degree of exacerbation that is markedly different from what is s...

متن کامل

Model Based Security Policy Assessment for E-Business Environment

The key to profitability for e-business is ensuring data integrity, service availability, and user information confidentiality along the entire e-services chain. Both staffs and IT system components need to compare secure policy with performance in an e-business environment. Currently, most efforts set focus on e-business process analysis and value-chain analysis, little attention is put on the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015