Start Date

12-16-2013

Description

In the information age, the failure of an organization to make employees comply with its information security policies is regarded as a key threat. For this reason, investigating employees’ information security policy violations has been a major concern in information security research. In most previous studies, information security compliance behavior was investigated at the individual level. The mechanism of information security compliance from a group perspective is not well known, either to practitioners or researchers. Therefore, this study attempts to investigate the impact of group characteristics on information security compliance from a social network perspective. For empirical validation, the survey research method is addressed. The expected results show there are significant connections between group security compliance intention and centrality compliance motivator alignments. Several theoretical contributions and managerial implications are discussed.

Share

COinS
 
Dec 16th, 12:00 AM

An Exploration of Group Information Security Compliance: A Social Network Analysis Perspective

In the information age, the failure of an organization to make employees comply with its information security policies is regarded as a key threat. For this reason, investigating employees’ information security policy violations has been a major concern in information security research. In most previous studies, information security compliance behavior was investigated at the individual level. The mechanism of information security compliance from a group perspective is not well known, either to practitioners or researchers. Therefore, this study attempts to investigate the impact of group characteristics on information security compliance from a social network perspective. For empirical validation, the survey research method is addressed. The expected results show there are significant connections between group security compliance intention and centrality compliance motivator alignments. Several theoretical contributions and managerial implications are discussed.