عرض بسيط للتسجيلة

المؤلفAlshare, Khaled A.
المؤلفLane, Peggy L.
المؤلفLane, Michael R.
تاريخ الإتاحة2024-01-24T07:34:18Z
تاريخ النشر2018-03-12
اسم المنشورInformation and Computer Security
المعرّفhttp://dx.doi.org/10.1108/ICS-09-2016-0073
الاقتباسAlshare, K. A., Lane, P. L., & Lane, M. R. (2018). Information security policy compliance: a higher education case study. Information & Computer Security, 26(1), 91-108.
الرقم المعياري الدولي للكتاب2056-4961
معرّف المصادر الموحدhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85044331856&origin=inward
معرّف المصادر الموحدhttp://hdl.handle.net/10576/51155
الملخصPurpose: The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory. Design/methodology/approach: The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression. Findings: The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibility and organizational security culture were significant predictors of violations of information security measures. Only interactional justice was not significant. Research limitations/implications: As with any exploratory case study, this research has limitations such as the self-reported information and the method of measuring the violation of information security measures. The method of measuring information security violations has been a challenge for researchers. Of course, the best method is to capture the actual behavior. Another limitation to this case study which might have affected the results is the significant number of faculty members in the respondent pool. The shared governance culture of faculty members on a US university campus might bias the results more than in a company environment. Caution should be applied when generalizing the results of this case study. Practical implications: The findings validate past research and should encourage managers to ensure employees are involved with developing and implementing information security measures. Additionally, the information security measures should be applied consistently and in a timely manner. Past research has focused more on the certainty and severity of sanctions and not as much on the celerity or swiftness of applying sanctions. The results of this research indicate there is a need to be timely (swift) in applying sanctions. The importance of information security should be grounded in company culture. Employees should have a strong sense of treating company data as they would want their own data to be treated. Social implications: Engaging employees in developing and implementing information security measures will reduce employees’ violations. Additionally, giving employees the assurance that all are given the same treatment when it comes to applying sanctions will reduce the violations. Originality/value: Setting and enforcing in a timely manner a solid sanction system will help in preventing information security violations. Moreover, creating a culture that fosters information security will help in positively affecting the employees’ perceptions toward privacy and responsibility, which in turn, impacts information security violations. This case study applies some existing theories in the context of the US higher education environment. The results of this case study contributed to the extension of existing theories by including new factors, on one hand, and confirming previous findings, on the other hand.
اللغةen
الناشرEmerald Publishing
الموضوعComputer security
Information security
Information security policy
Information security policy compliance
Organizational justice theory
Violations of information security
العنوانInformation security policy compliance: a higher education case study
النوعArticle
الصفحات91-108
رقم العدد1
رقم المجلد26
dc.accessType Open Access


الملفات في هذه التسجيلة

Thumbnail

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة