Cargando…

An Integrative Behavioral Model of Information Security Policy Compliance

The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, me...

Descripción completa

Detalles Bibliográficos
Autores principales: Kim, Sang Hoon, Yang, Kyung Hoon, Park, Sunyoung
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058133/
https://www.ncbi.nlm.nih.gov/pubmed/24971373
http://dx.doi.org/10.1155/2014/463870
_version_ 1782321077646524416
author Kim, Sang Hoon
Yang, Kyung Hoon
Park, Sunyoung
author_facet Kim, Sang Hoon
Yang, Kyung Hoon
Park, Sunyoung
author_sort Kim, Sang Hoon
collection PubMed
description The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized.
format Online
Article
Text
id pubmed-4058133
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-40581332014-06-26 An Integrative Behavioral Model of Information Security Policy Compliance Kim, Sang Hoon Yang, Kyung Hoon Park, Sunyoung ScientificWorldJournal Research Article The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized. Hindawi Publishing Corporation 2014 2014-05-28 /pmc/articles/PMC4058133/ /pubmed/24971373 http://dx.doi.org/10.1155/2014/463870 Text en Copyright © 2014 Sang Hoon Kim et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Kim, Sang Hoon
Yang, Kyung Hoon
Park, Sunyoung
An Integrative Behavioral Model of Information Security Policy Compliance
title An Integrative Behavioral Model of Information Security Policy Compliance
title_full An Integrative Behavioral Model of Information Security Policy Compliance
title_fullStr An Integrative Behavioral Model of Information Security Policy Compliance
title_full_unstemmed An Integrative Behavioral Model of Information Security Policy Compliance
title_short An Integrative Behavioral Model of Information Security Policy Compliance
title_sort integrative behavioral model of information security policy compliance
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058133/
https://www.ncbi.nlm.nih.gov/pubmed/24971373
http://dx.doi.org/10.1155/2014/463870
work_keys_str_mv AT kimsanghoon anintegrativebehavioralmodelofinformationsecuritypolicycompliance
AT yangkyunghoon anintegrativebehavioralmodelofinformationsecuritypolicycompliance
AT parksunyoung anintegrativebehavioralmodelofinformationsecuritypolicycompliance
AT kimsanghoon integrativebehavioralmodelofinformationsecuritypolicycompliance
AT yangkyunghoon integrativebehavioralmodelofinformationsecuritypolicycompliance
AT parksunyoung integrativebehavioralmodelofinformationsecuritypolicycompliance