Abstract
Employees are regarded as the weakest link in organizations' information security management, and their security compliance is crucial in determining organizations' information security success. Prior literature has extensively investigated the influences of formal management controls (i.e. deterrence, rewards, and monitoring) on employees' security compliance; however, other control mechanisms such as social control and self-control have drawn less attention. In this study, we proposed a taxonomy of the formal and informal control mechanisms used in security management, and proposed an integrative, control-based model to understand employees' security compliance behaviors. We further validated the model with a meta-analysis. Our model was largely supported by the meta-analysis results. We found informal social controls and self-control to be more effective in promoting security compliance than formal controls. In addition, we found that the influences of formal and informal controls on security compliance were moderated by the eastern / western culture context.
| Original language | English |
|---|---|
| Title of host publication | International Conference on Information Systems 2019 Proceedings |
| Publisher | Association for Information Systems |
| ISBN (Electronic) | 9780996683197 |
| Publication status | Published - Dec 2019 |
| Event | 40th International Conference on Information Systems (ICIS 2019) - Internationales Congress Center München (ICM), Munich, Germany Duration: 15 Dec 2019 → 18 Dec 2019 https://icis2019.aisconferences.org/ https://aisel.aisnet.org/icis2019/ |
Publication series
| Name | International Conference on Information Systems, ICIS |
|---|
Conference
| Conference | 40th International Conference on Information Systems (ICIS 2019) |
|---|---|
| Place | Germany |
| City | Munich |
| Period | 15/12/19 → 18/12/19 |
| Internet address |
Research Keywords
- Deterrence
- Formal control
- Informal control
- Information security
- Meta-analysis
- Policy compliance
Fingerprint
Dive into the research topics of 'Validating a Control-Based Model of Information Security Policy Compliance – A Meta-Analysis'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver