629
Views
26
CrossRef citations to date
0
Altmetric
Original Articles

Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines?

 

ABSTRACT

This study was designed to examine the impacts of employees’ cost–benefit analysis, deterrence considerations, and top management support and beliefs on information systems security policy compliance. Surveys of Canadian professionals’ perceptions were carried out. A research model was proposed and tested. The results confirmed that top management support and beliefs, sanction severity, and cost–benefit analysis significantly influenced employees’ information systems security policy compliance. The implications of the study findings are discussed, and conclusions are drawn.

Additional information

Funding

Funding for this study was obtained from the research policy (RP) grants of Cape Breton University, Canada.

Notes on contributors

Princely Ifinedo

Princely Ifinedo is an Associate Professor at Cape Breton University, Canada. He holds a PhD in IS from University of Jyväskylä, Finland, an MBA from the Royal Holloway, University of London, UK, and an MSc from Tallinn University of Technology, Estonia. His research includes enterprise resource planning (ERP) success and IS security management. He has presented at various IS conferences, contributed chapters to several books/encyclopedias, and published in journals such as Information & Management, International Journal of Information Management, Journal of Computer Information Systems, Computer & Security, Journal of Information Security and Privacy, Internet Research, DATA BASE, Journal of Global Information Technology Management, and Computer in Human Behavior. He has authored over 100 peer-reviewed publications and he is affiliated with Association for Information Systems and CIPS.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.