Back to Search
Start Over
Variables influencing information security policy complianceA systematic review of quantitative studies.
- Source :
- Information Management & Computer Security; 2014, Vol. 22 Issue 1, p42-75, 34p
- Publication Year :
- 2014
-
Abstract
- Purpose – The purpose of this paper is to identify variables that influence compliance with information security policies of organizations and to identify how important these variables are. Design/methodology/approach – A systematic review of empirical studies described in extant literature is performed. This review found 29 studies meeting its inclusion criterion. The investigated variables in these studies and the effect size reported for them were extracted and analysed. Findings – In the 29 studies, more than 60 variables have been studied in relation to security policy compliance and incompliance. Unfortunately, no clear winners can be found among the variables or the theories they are drawn from. Each of the variables only explains a small part of the variation in people's behaviour and when a variable has been investigated in multiple studies the findings often show a considerable variation. Research limitations/implications – It is possible that the disparate findings of the reviewed studies can be explained by the sampling methods used in the studies, the treatment/control of extraneous variables and interplay between variables. These aspects ought to be addressed in future research efforts. Practical implications – For decision makers who seek guidance on how to best achieve compliance with their information security policies should recognize that a large number of variables probably influence employees' compliance. In addition, both their influence strength and interplay are uncertain and largely unknown. Originality/value – This is the first systematic review of research on variables that influence compliance with information security policies of organizations. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 09685227
- Volume :
- 22
- Issue :
- 1
- Database :
- Complementary Index
- Journal :
- Information Management & Computer Security
- Publication Type :
- Academic Journal
- Accession number :
- 94621951
- Full Text :
- https://doi.org/10.1108/IMCS-08-2012-0045