TY - GEN
T1 - Cognitive elaboration on potential outcomes and its effects on employees' information security policy compliance intention-exploring the key antecedents
AU - Yang, Xue
AU - Yue, Wei T.
AU - Sia, Choon Lin
PY - 2012
Y1 - 2012
N2 - IS security policy is one of the essential tools to ensure the secure use of information systems and technological assets. To enhance the effectiveness of policy implementation, organizations rely on security training, education and awareness (STEA) programs to help employees understand the IS security issues of the organization. However, different levels of STEA informativeness may have conflicting effects on employees' compliance decisions. In addition, the urgency of a task may also lead employees to abandon the compliance decision occasionally. The existing corporate information security policy (ISP) could also serve as a deterrence message that would influence compliance decisions. An experimental survey was conducted to examine this phenomenon and test the related hypotheses. The results of this study can be used to inform and guide researchers and practitioners as to how to better enforce an IS security policy through better implementation of STEA programs and improved design of ISP in different task scenarios. © 2012 Springer-Verlag Berlin Heidelberg.
AB - IS security policy is one of the essential tools to ensure the secure use of information systems and technological assets. To enhance the effectiveness of policy implementation, organizations rely on security training, education and awareness (STEA) programs to help employees understand the IS security issues of the organization. However, different levels of STEA informativeness may have conflicting effects on employees' compliance decisions. In addition, the urgency of a task may also lead employees to abandon the compliance decision occasionally. The existing corporate information security policy (ISP) could also serve as a deterrence message that would influence compliance decisions. An experimental survey was conducted to examine this phenomenon and test the related hypotheses. The results of this study can be used to inform and guide researchers and practitioners as to how to better enforce an IS security policy through better implementation of STEA programs and improved design of ISP in different task scenarios. © 2012 Springer-Verlag Berlin Heidelberg.
KW - Cognitive Elaboration
KW - Compliance Intention
KW - Deterrence
KW - Education and Awareness
KW - Informativeness
KW - Security Training
KW - Task Urgency
UR - http://www.scopus.com/inward/record.url?scp=84879741915&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84879741915&origin=recordpage
U2 - 10.1007/978-3-642-29873-8_17
DO - 10.1007/978-3-642-29873-8_17
M3 - RGC 32 - Refereed conference paper (with host publication)
SN - 9783642298721
VL - 108 LNBIP
T3 - Lecture Notes in Business Information Processing
SP - 180
EP - 194
BT - E-Life
PB - Springer Verlag
T2 - 10th Workshop on E-Business on E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, WEB 2011
Y2 - 4 December 2011 through 4 December 2011
ER -