Compliance With Information Security Policies And Procedures

826 Words Aug 4th, 2015 4 Pages
Compliance with information security policies and procedures is one particular area with many implications in the research literature of information security management. Consistent with other scholars (eg., Ifinedo, 2012; ), we identified user participation implications that prevent user compliance with information security policies and procedures. To start with, Ifinedo (2012) influences his argument in his research paper by stating, as suggested by other researchers like Herath and Rao (2009), that multi-perspective methods for defending the IS assets and resources should be the responsibility of the organizations.
Consequently, one perspective is that employees constitute an insider threat to their organizations (Warkentin and Willison, 2009). For that reason, organizations want to defense their resources through the use of socio-organizational requirements. In this paper, the author conducted a survey of 124 IS professionals and managers which revealed that IS security policy behavioral compliance intention was influenced by reasons such as self-efficacy, response efficacy, attitude toward compliance, perceived vulnerability, and subjective norms. This information helps to assure his argument by the data analysis implementation using the partial least squares (PLS) technique. Furthermore, the author’s research model was aimed to enhance our knowledge of the IS security compliance in organizations.
Likewise, Spears and Barki (2010) smoothly claimed that user participation…
Open Document