![](/images/graphics-bg.png)
An Integrative Behavioral Model of Information Security Policy Compliance
المؤلفون المشاركون
Kim, Sang Hoon
Yang, Kyung Hoon
Park, Sunyoung
المصدر
العدد
المجلد 2014، العدد 2014 (31 ديسمبر/كانون الأول 2014)، ص ص. 1-12، 12ص.
الناشر
Hindawi Publishing Corporation
تاريخ النشر
2014-05-28
دولة النشر
مصر
عدد الصفحات
12
التخصصات الرئيسية
الطب البشري
تكنولوجيا المعلومات وعلم الحاسوب
الملخص EN
The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory.
Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy.
Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations.
Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance.
By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived.
Data were collected by conducting a survey; 194 out of 207 questionnaires were available.
The test of the causal model was conducted by PLS.
The reliability, validity, and model fit were found to be statistically significant.
The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable.
The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review.
Also, the study has some practical implications.
First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations.
Second, it proves that the need of education and training programs suppressing members’ neutralization intention to violate information security policy should be emphasized.
نمط استشهاد جمعية علماء النفس الأمريكية (APA)
Kim, Sang Hoon& Yang, Kyung Hoon& Park, Sunyoung. 2014. An Integrative Behavioral Model of Information Security Policy Compliance. The Scientific World Journal،Vol. 2014, no. 2014, pp.1-12.
https://search.emarefa.net/detail/BIM-1049714
نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)
Kim, Sang Hoon…[et al.]. An Integrative Behavioral Model of Information Security Policy Compliance. The Scientific World Journal No. 2014 (2014), pp.1-12.
https://search.emarefa.net/detail/BIM-1049714
نمط استشهاد الجمعية الطبية الأمريكية (AMA)
Kim, Sang Hoon& Yang, Kyung Hoon& Park, Sunyoung. An Integrative Behavioral Model of Information Security Policy Compliance. The Scientific World Journal. 2014. Vol. 2014, no. 2014, pp.1-12.
https://search.emarefa.net/detail/BIM-1049714
نوع البيانات
مقالات
لغة النص
الإنجليزية
الملاحظات
Includes bibliographical references
رقم السجل
BIM-1049714
قاعدة معامل التأثير والاستشهادات المرجعية العربي "ارسيف Arcif"
أضخم قاعدة بيانات عربية للاستشهادات المرجعية للمجلات العلمية المحكمة الصادرة في العالم العربي
![](/images/ebook-kashef.png)
تقوم هذه الخدمة بالتحقق من التشابه أو الانتحال في الأبحاث والمقالات العلمية والأطروحات الجامعية والكتب والأبحاث باللغة العربية، وتحديد درجة التشابه أو أصالة الأعمال البحثية وحماية ملكيتها الفكرية. تعرف اكثر
![](/images/kashef-image.png)