The sufficiency of the theory of planned behavior for explaining information security policy compliance

نویسندگان

  • Teodor Sommestad
  • Henrik Karlzén
  • Jonas Hallberg
چکیده

Purpose: The theory of planned behavior is an established theory that has been found to predict compliance with information security policies well. This paper challenges this assumption that the theory includes all constructs that explain information security policy compliance and investigates if anticipated regret or constructs from the protection motivation theory add explanatory power. Design/methodology/approach: Responses from 306 respondents at a research organization was collected using a questionnaire-based survey. Extensions in terms of anticipated regret and constructs drawn from protection motivation theory are tested using through hierarchical regression analysis. Findings: Adding anticipated regret and the threat appraisal process results in improvements of the predictions of intentions. The improvements are of sufficient magnitude to warrant adjustments of the model of theory of planned behavior when it is used in the area of information security policy compliance. Originality/value: This study is the first test of anticipated regret as a predictor of information security policy compliance and the first to assess its influence in relation to the theory of planned behavior and protection motivation theory.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Advantage, Self-sufficiency and Food Security in Iran: Case Study of Wheat Commodity

Food security has a dynamic notion during the time and may be affected by various domestic and global factors.Nevertheless, Iranian policy makers consider food security as same as self-sufficiency in agricultural food products, particularly wheat production. However, self-sufficiency can contribute to food security only if it is in coincidences with comparative advantage and sustainable resourc...

متن کامل

An Integrative Behavioral Model of Information Security Policy Compliance

The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to d...

متن کامل

Information Security Policy Compliance: An Empirical Study on Escalation of Commitment

This study aims to facilitate a new understanding on employees’ attitude towards compliance with the requirements of their information security policy (ISPs) through the lens of escalation. Escalation presents a situation in which employees must decide whether to persist in or withdraw from a non-performing task. Drawing on the Theory of Planned Behavior (TPB) and Agency Theory, our model delin...

متن کامل

Application of the theory of planned behaviour in nursing care

Introduction: Nurses are an integral part of the health system and predicting their behavior in different situations is important for policymakers and managers of the health system. The present study was conducted to determine the efficiency of the theory of planned behavior in predicting the behavior of nurses in different situations. Methods: The current narrative review study was conducted ...

متن کامل

Social Groupings and Information Security Obedience Within Organizations

Individuals’ compliance with information security policies is important for the overall security of organizations. It has been suggested that obedience cultures exist in organizations and that social processes and structures play a role for the compliance intentions and compliance behavior of individuals. This paper investigates if individuals’ compliance intention is more homogenous within soc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. & Comput. Security

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2015