2013
DOI: 10.1016/j.cose.2012.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Organizational power and information security rule compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
29
0
3

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(34 citation statements)
references
References 31 publications
(40 reference statements)
2
29
0
3
Order By: Relevance
“…Yet, it is not uncommon to observe end users veering off or deviating from basic moral standards and organizational expectations due to reasons such as thrill‐seeking, dissatisfaction, carelessness, and sheer ignorance , . Unfortunately, a worker who engages in a PROSCRIBED IS security behavior may continue to do so daily at work and so inadvertently put his or her organization at risk , . To effectively manage and control employees' nonmalicious IS security behaviors in the workplace, researchers need to have a clear and thorough understanding of the phenomenon.…”
Section: Background Informationmentioning
confidence: 99%
“…Yet, it is not uncommon to observe end users veering off or deviating from basic moral standards and organizational expectations due to reasons such as thrill‐seeking, dissatisfaction, carelessness, and sheer ignorance , . Unfortunately, a worker who engages in a PROSCRIBED IS security behavior may continue to do so daily at work and so inadvertently put his or her organization at risk , . To effectively manage and control employees' nonmalicious IS security behaviors in the workplace, researchers need to have a clear and thorough understanding of the phenomenon.…”
Section: Background Informationmentioning
confidence: 99%
“…Consequently, questions about security failures in context need to address the relevance of security policies from the perspectives of professional stakeholders. In many cases, it has been found that professionals attempting to improve their effectiveness will work around security compliance or bypass security measures altogether (Albrechtsen, 2007;Koppel et al, 2015;Kolkowska and Dhillon, 2013). Sadok and Bednar (2016) conducted a survey involving 33 SMEs in the UK on their approach to information security risks.…”
Section: Understanding Deficiencies In Security Practicesmentioning
confidence: 99%
“…Management commitment is an internalised organizational pressure that affects the behaviours of employees in complying with information security standards and policies. The visible participation, ongoing communication and championing of senior management stimulate employees' intentions towards information security compliance and encourage the adherence to information security standards and policies (Knapp et al, 2006;Kolkowska & Dhillon, 2012). Management commitment has a persuasive effect on employees' information security compliance.…”
Section: Management Commitmentmentioning
confidence: 99%