Start Date
12-16-2013
Description
In the information age, the failure of an organization to make employees comply with its information security policies is regarded as a key threat. For this reason, investigating employees’ information security policy violations has been a major concern in information security research. In most previous studies, information security compliance behavior was investigated at the individual level. The mechanism of information security compliance from a group perspective is not well known, either to practitioners or researchers. Therefore, this study attempts to investigate the impact of group characteristics on information security compliance from a social network perspective. For empirical validation, the survey research method is addressed. The expected results show there are significant connections between group security compliance intention and centrality compliance motivator alignments. Several theoretical contributions and managerial implications are discussed.
Recommended Citation
Yoo, Chul Woo and Sanders, G. Lawrence, "An Exploration of Group Information Security Compliance: A Social Network Analysis Perspective" (2013). ICIS 2013 Proceedings. 18.
https://aisel.aisnet.org/icis2013/proceedings/ResearchInProgress/18
An Exploration of Group Information Security Compliance: A Social Network Analysis Perspective
In the information age, the failure of an organization to make employees comply with its information security policies is regarded as a key threat. For this reason, investigating employees’ information security policy violations has been a major concern in information security research. In most previous studies, information security compliance behavior was investigated at the individual level. The mechanism of information security compliance from a group perspective is not well known, either to practitioners or researchers. Therefore, this study attempts to investigate the impact of group characteristics on information security compliance from a social network perspective. For empirical validation, the survey research method is addressed. The expected results show there are significant connections between group security compliance intention and centrality compliance motivator alignments. Several theoretical contributions and managerial implications are discussed.