Skip to main content
Top

16-03-2023

Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation

Authors: Ricardo R. Brooks, Kevin J. Williams, So-Yun Lee

Published in: Journal of Business and Psychology

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The objective of this study was to examine the roles that organizational security climate and perceived costs and rewards of compliance play in predicting the extent to which people endorse compliance or violation of specific information security policies (ISP). A low-fidelity simulation placed participants in either a strong or weak information security climate and presented them with four cybersecurity scenarios that assessed their judgments of complying with or violating security policies in those situations. Results indicated that information security climate relates to intent to comply with a company’s security policies via attitudes, subjective norms, and perceived behavioral control, in line with the predictions of the theory of planned behavior (Ajzen, 1991). Strong intentions to comply with policies, in turn, were associated with greater endorsement of compliant behaviors and decreased endorsement of policy violations in the specific scenarios. However, whether or not individuals chose to endorse compliance with or violation of specific policies, after initial intentions were formed, was also influenced by their perceived costs and rewards of compliance. The effects of costs were particularly strong: as perceived costs increased, participants were more likely to endorse ISP violations. Our findings suggest that establishing a strong information security climate may reduce the chances of security breaches, but that organizations should also intervene to reduce the perceived burden and inconvenience of security tasks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
For the purpose of this study ISP “violations” follow the Cram and colleagues (2019) definition operationalizing violations as the degree to which an employee fails to comply with the requirements outlined in a given set of ISP.
 
2
We used the following search terms: information security policy, information security compliance, cybersecurity compliance, compliance, noncompliance, violation, information security policy. These terms were entered into the following databases: PROQUEST™: PsychARTICLES, IEEE Xplore Digital Library™, EBSCO™ and Computers and Applied Sciences Complete, along with Google Scholar.
 
Literature
go back to reference Bauer, S., & Bernroider, E. W. N. (2017). From information security awareness to reasoned compliant action: Analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 48(3), 44–68. https://doi.org/10.1145/3130515.3130519CrossRef Bauer, S., & Bernroider, E. W. N. (2017). From information security awareness to reasoned compliant action: Analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 48(3), 44–68. https://​doi.​org/​10.​1145/​3130515.​3130519CrossRef
go back to reference Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864. https://www.jstor.org/stable/26628654 Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864. https://​www.​jstor.​org/​stable/​26628654
go back to reference Chen, Y., Galletta, D. F., Lowry, P. B., Luo, X. R., Moody, G. D., & Willison, R. (2021). Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model. Information Systems Research, 32(3), 1043–1065. https://doi.org/10.1287/isre.2021.1014CrossRef Chen, Y., Galletta, D. F., Lowry, P. B., Luo, X. R., Moody, G. D., & Willison, R. (2021). Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model. Information Systems Research, 32(3), 1043–1065. https://​doi.​org/​10.​1287/​isre.​2021.​1014CrossRef
go back to reference Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Addison-Wesley. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Addison-Wesley.
go back to reference Jaafar, N. I., & Ajis, A. (2013). Organizational climate and individual factors effects on information security compliance behaviour. International Journal of Business and Social Science, 4(10), 118–130. Jaafar, N. I., & Ajis, A. (2013). Organizational climate and individual factors effects on information security compliance behaviour. International Journal of Business and Social Science, 4(10), 118–130.
go back to reference Jenkins, J. L., & Durcikova, A. (2013). What, I shouldn’t have done that? The influence of training and just-in-time reminders on secure behavior. In R. Baskerville & M. Chau, (Eds.), Proceedings of International Conference on Information Systems, Milan. Jenkins, J. L., & Durcikova, A. (2013). What, I shouldn’t have done that? The influence of training and just-in-time reminders on secure behavior. In R. Baskerville & M. Chau, (Eds.), Proceedings of International Conference on Information Systems, Milan.
go back to reference Lewin, K. (1943). Defining the field at a given time. Psychological Review, 50, 292–310.CrossRef Lewin, K. (1943). Defining the field at a given time. Psychological Review, 50, 292–310.CrossRef
go back to reference Schneider, B. (1990). The climate for service: An application of the climate construct. Organizational Climate and Culture, 1, 383–412. Schneider, B. (1990). The climate for service: An application of the climate construct. Organizational Climate and Culture, 1, 383–412.
go back to reference Schneider, B. (2000). The psychological life of organizations. In N. Ashkanasy, C. P. M. Wilderom, & M. F. Peterson (Eds.), Handbook of Organizational Culture & Climate (pp. 17–21). Sage. Schneider, B. (2000). The psychological life of organizations. In N. Ashkanasy, C. P. M. Wilderom, & M. F. Peterson (Eds.), Handbook of Organizational Culture & Climate (pp. 17–21). Sage.
Metadata
Title
Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation
Authors
Ricardo R. Brooks
Kevin J. Williams
So-Yun Lee
Publication date
16-03-2023
Publisher
Springer US
Published in
Journal of Business and Psychology
Print ISSN: 0889-3268
Electronic ISSN: 1573-353X
DOI
https://doi.org/10.1007/s10869-023-09878-8