Information security policy compliance model in organizations

Nader Sohrabi Safa, Rossouw Von Solms, Steven Furnell

Research output: Contribution to journalArticle

123 Citations (Scopus)

Abstract

The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarantee a secure environment for information; the human aspects of information security should be taken into consideration, besides the technological aspects. The lack of information security awareness, ignorance, negligence, apathy, mischief, and resistance are the root of users' mistakes. In this research, a novel model shows how complying with organizational information security policies shapes and mitigates the risk of employees' behaviour. The significant aspect of this research is derived from the conceptualization of different aspects of involvement, such as information security knowledge sharing, collaboration, intervention and experience, as well as attachment, commitment, and personal norms that are important elements in the Social Bond Theory. The results of the data analysis revealed that information security knowledge sharing, collaboration, intervention and experience all have a significant effect on employees' attitude towards compliance with organizational information security policies. However, attachment does not have a significant effect on employees' attitude towards information security policy compliance. In addition, the findings have shown that commitment and personal norms affect employees' attitude. Attitude towards compliance with information security organizational policies also has a significant effect on the behavioural intention regarding information security compliance.

Original languageEnglish
Pages (from-to)70-82
Number of pages13
JournalComputers and Security
Volume56
Early online date3 Nov 2015
DOIs
Publication statusPublished - 1 Feb 2016
Externally publishedYes

Keywords

  • Attitude
  • Information security
  • Involvement
  • Organization policies
  • Users' behaviour

ASJC Scopus subject areas

  • Computer Science(all)
  • Law

Fingerprint Dive into the research topics of 'Information security policy compliance model in organizations'. Together they form a unique fingerprint.

Cite this