Protection motivation and deterrence: a framework for security policy compliance in organisations

被引:775
作者
Herath, Tejaswini [1 ]
Rao, H. Raghav [2 ,3 ]
机构
[1] Brock Univ, Dept Finance Operat & Informat Syst, St Catharines, ON L2S 3A1, Canada
[2] SUNY Buffalo, Sch Management, Buffalo, NY 14260 USA
[3] SUNY Buffalo, Coll Engn, Buffalo, NY 14260 USA
基金
美国国家科学基金会;
关键词
security policy compliance; protection motivation; deterrence; organisational commitment; COMPUTER SELF-EFFICACY; INFORMATION-TECHNOLOGY; FEAR APPEALS; GENERAL DETERRENCE; PLANNED BEHAVIOR; SOFTWARE PIRACY; ATTITUDES; ADOPTION; SYSTEMS; MODEL;
D O I
10.1057/ejis.2009.6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is informed by the literature on IS adoption, protection-motivation theory, deterrence theory, and organisational behaviour, and is motivated by the fundamental premise that the adoption of information security practices and policies is affected by organisational, environmental, and behavioural factors. We develop an Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todd's Decomposed Theory of Planned Behaviour. Furthermore, we evaluate the effect of organisational commitment on employee security compliance intentions. Finally, we empirically test the theoretical model with a data set representing the survey responses of 312 employees from 78 organisations. Our results suggest that (a) threat perceptions about the severity of breaches and response perceptions of response efficacy, self-efficacy, and response costs are likely to affect policy attitudes; (b) organisational commitment and social influence have a significant impact on compliance intentions; and (c) resource availability is a significant factor in enhancing self-efficacy, which in turn, is a significant predictor of policy compliance intentions. We find that employees in our sample underestimate the probability of security breaches. European Journal of Information Systems (2009) 18, 106-125. doi:10.1057/ejis.2009.6; published online 21 April 2009
引用
收藏
页码:106 / 125
页数:20
相关论文
共 87 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]   PREDICTION OF GOAL-DIRECTED BEHAVIOR - ATTITUDES, INTENTIONS, AND PERCEIVED BEHAVIORAL-CONTROL [J].
AJZEN, I ;
MADDEN, TJ .
JOURNAL OF EXPERIMENTAL SOCIAL PSYCHOLOGY, 1986, 22 (05) :453-474
[3]   RATIONAL CHOICE, DETERRENCE, AND SOCIAL-LEARNING THEORY IN CRIMINOLOGY - THE PATH NOT TAKEN [J].
AKERS, RL .
JOURNAL OF CRIMINAL LAW & CRIMINOLOGY, 1990, 81 (03) :653-676
[4]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[5]  
ANDERSON C, 2005, 10 INFORMS C INF SYS
[6]   Social cognition models and health behaviour: A structured review [J].
Armitage, CJ ;
Conner, M .
PSYCHOLOGY & HEALTH, 2000, 15 (02) :173-189
[7]   PREVENTING NUCLEAR-WAR - BELIEFS AND ATTITUDES AS PREDICTORS OF DISARMIST AND DETERRENTIST BEHAVIOR [J].
AXELROD, LJ ;
NEWTON, JW .
JOURNAL OF APPLIED SOCIAL PSYCHOLOGY, 1991, 21 (01) :29-40
[8]   THE SELF-REGULATION OF ATTITUDES, INTENTIONS, AND BEHAVIOR [J].
BAGOZZI, RP .
SOCIAL PSYCHOLOGY QUARTERLY, 1992, 55 (02) :178-204
[9]   TESTS OF THE GENERALITY OF SELF-EFFICACY THEORY [J].
BANDURA, A ;
ADAMS, NE ;
HARDY, AB ;
HOWELLS, GN .
COGNITIVE THERAPY AND RESEARCH, 1980, 4 (01) :39-66
[10]  
Barge J.K., 1988, Management Communication Quarterly, V2, P116