Nader Sohrabi Safa
Information security policy compliance model in organizations
Sohrabi Safa, Nader; Von Solms, Rossouw; Furnell, Steven
Authors
Rossouw Von Solms
Professor STEVEN FURNELL STEVEN.FURNELL@NOTTINGHAM.AC.UK
PROFESSOR OF CYBER SECURITY
Abstract
© 2015 Elsevier Ltd. All rights reserved. The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarantee a secure environment for information; the human aspects of information security should be taken into consideration, besides the technological aspects. The lack of information security awareness, ignorance, negligence, apathy, mischief, and resistance are the root of users' mistakes. In this research, a novel model shows how complying with organizational information security policies shapes and mitigates the risk of employees' behaviour. The significant aspect of this research is derived from the conceptualization of different aspects of involvement, such as information security knowledge sharing, collaboration, intervention and experience, as well as attachment, commitment, and personal norms that are important elements in the Social Bond Theory. The results of the data analysis revealed that information security knowledge sharing, collaboration, intervention and experience all have a significant effect on employees' attitude towards compliance with organizational information security policies. However, attachment does not have a significant effect on employees' attitude towards information security policy compliance. In addition, the findings have shown that commitment and personal norms affect employees' attitude. Attitude towards compliance with information security organizational policies also has a significant effect on the behavioural intention regarding information security compliance.
Citation
Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers and Security, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 17, 2015 |
Online Publication Date | Nov 3, 2015 |
Publication Date | Feb 1, 2016 |
Deposit Date | Sep 14, 2020 |
Journal | Computers and Security |
Print ISSN | 0167-4048 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 56 |
Pages | 70-82 |
DOI | https://doi.org/10.1016/j.cose.2015.10.006 |
Public URL | https://nottingham-repository.worktribe.com/output/4868256 |
Publisher URL | https://www.sciencedirect.com/science/article/pii/S0167404815001583?via%3Dihub |
You might also like
Pre-Signature Scheme for Trustworthy Offline V2V Communication
(2023)
Presentation / Conference Contribution
Evaluation of Contextual and Game-Based Training for Phishing Detection
(2022)
Journal Article
Accessible authentication: Assessing the applicability for users with disabilities
(2021)
Journal Article
Developing a cyber security culture: Current practices and future needs
(2021)
Journal Article
An empirical analysis of the information security culture key factors framework
(2021)
Journal Article
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search