The objective of our paper is to conceptually and empirically challenge the idea of general information security policy (ISP) compliance. Conceptually, we argue that general ISP compliance is an ill-defined concept that has minimal theoretical usefulness because the policy-directed security actions vary considerably from threat to threat in terms of time, difficulty, diligence, knowledge, and effort. Yet, our senior IS scholars’ basket of journals has a strong preference to publish models in which the authors speculate that their findings are generalizable across all (or many) threats and controls contained in an organization’s ISP document. In our paper, we argue that compliance with each of the mandatory threat-specific security actions m...
Information security is one of the major challenges for organizations that critically depend on info...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
© 2014 Wiley Publishing Ltd.Organisations increasingly rely on information and related systems, whic...
Information security compliance behavior research has produced several theoretical models derived fr...
Information systems security (ISS) behavioral research has produced different models to explain secu...
Conceptual replications offer robust tests of theory by subjecting the relational notions of a scien...
In order to ensure that employees abide by their organizations’ Information Security Policies (ISP),...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
Information security is among the top organizational priorities. Theoretically, information security...
In the face of ever-growing IS-security breaches and their substantial impacts on organizations and ...
Business information, held within information systems, is critical for most organizations. To protec...
Employees’ compliance with Information Systems Security Policies (ISP) is critical for protecting or...
Information security is one of the major challenges for organizations that critically depend on info...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
© 2014 Wiley Publishing Ltd.Organisations increasingly rely on information and related systems, whic...
Information security compliance behavior research has produced several theoretical models derived fr...
Information systems security (ISS) behavioral research has produced different models to explain secu...
Conceptual replications offer robust tests of theory by subjecting the relational notions of a scien...
In order to ensure that employees abide by their organizations’ Information Security Policies (ISP),...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
Information security is among the top organizational priorities. Theoretically, information security...
In the face of ever-growing IS-security breaches and their substantial impacts on organizations and ...
Business information, held within information systems, is critical for most organizations. To protec...
Employees’ compliance with Information Systems Security Policies (ISP) is critical for protecting or...
Information security is one of the major challenges for organizations that critically depend on info...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
© 2014 Wiley Publishing Ltd.Organisations increasingly rely on information and related systems, whic...