Back to Search
Start Over
Building an awareness-centered information security policy compliance model
- Source :
- Industrial Management & Data Systems. 120:231-247
- Publication Year :
- 2019
- Publisher :
- Emerald, 2019.
-
Abstract
- Purpose The purpose of this paper is to build an awareness-centered information security policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and that awareness depends upon several variables that influence successful ISP compliance. Design/methodology/approach The authors built a model with seven constructs, i.e., leadership, trusting beliefs, information security issues awareness (ISIA), ISP awareness, understanding resource vulnerability, self-efficacy (SE) and intention to comply. Seven hypotheses were stated. A sample of 285 non-management employees was used from various organizations in the USA. The authors used path modeling to analyze the data. Findings The findings indicated that IS awareness depends on effective organizational leadership and elevated employees’ trusting beliefs. The understanding of resource vulnerability (URV) and SE are influenced by IS awareness resulting from effective leadership and elevated employees’ trusting beliefs which guide employees to comply with ISP requirements. Practical implications Practical implications were aimed at organizations embracing an awareness-centered information security compliance program to secure organizations’ assets against threats by implementing various security education and training awareness programs. Originality/value This paper asserts that awareness is central to ISP compliance. Leadership and trusting beliefs variables play significant roles in the information security awareness which in turn positively affect employees’ URV and SE variables leading employees to comply with the ISP requirements.
- Subjects :
- business.industry
Strategy and Management
Sample (statistics)
Information security
Public relations
Affect (psychology)
Industrial and Manufacturing Engineering
Computer Science Applications
Management Information Systems
Compliance (psychology)
Resource (project management)
Leadership studies
Industrial relations
Information security awareness
business
Vulnerability (computing)
Subjects
Details
- ISSN :
- 02635577
- Volume :
- 120
- Database :
- OpenAIRE
- Journal :
- Industrial Management & Data Systems
- Accession number :
- edsair.doi...........7737736bdad680fb3d95d20e2d9b1df1
- Full Text :
- https://doi.org/10.1108/imds-07-2019-0412