Determinants of Compliance With Information Systems Security Controls: A Case of a Business Organization in South Africa

Determinants of Compliance With Information Systems Security Controls: A Case of a Business Organization in South Africa

Ntokozo Siphesihle Ndlovu, Patrick Ndayizigamiye, Macire Kante
DOI: 10.4018/978-1-7998-8693-8.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The purpose of this study is to determine the factors that critically contribute to employees of an organization complying with the information security controls that have been set in place. Whether it is an attitude or an intention that leads to complying, this chapter looks at the theory of planned behavior (TPB). A company was chosen, and a questionnaire was handed out to the employees. The questionnaire distributed focuses only on the elements that are within the theory of planned behavior model. The questionnaire is anonymous, and because of this, the confidence and confidentiality are given. As a result of these two factors, it was seen that the elements of the chosen model are not 100% the contributing factor as to why employees comply with information security controls within Company X. It is therefore implied that more research has to be done to figure out what exactly makes the employees comply.
Chapter Preview
Top

Introduction

Information Systems Security Controls are vital to any organization, and Company X is no different. The Computer Business Review has reported that there have been 945 data breaches that led to 4.5 billion data records being compromised worldwide. This all happened in the first half of the year 2018. Records that have been compromised include huge companies such as Adidas (which had 2 million records compromised) as well as Facebook (which had up to two billion records compromised) (Targett, 2018). This article links the Theory of Planned Behavior. Some factors make up this model, and each of these factors is measured so that compliance with the Information Security Controls of Company X is linked to its employees. This is the goal because of the hypothesis that has been mentioned later on in the article. The literature review consists of sections where sentences are bold to be compared to the results of Company X’s data.

Key Terms in this Chapter

Theory: A system of statements targeted at describing, explaining, and predicting real-world phenomena. A scientific theory is a system composed of two core constituents: (1) factors and (2) hypotheses.

Compliance: Conforming to a rule, such as a specification, policy, standard or law. In this study, it means students and staff conforming to the standards of the university in terms of Information, software, data use for their work.

Model: A system of statements targeted at describing, explaining, and predicting real-world phenomena.

Latent Variable: They are variables that are not directly observed but are rather inferred (through a mathematical model) from other variables that are observed (directly measured).

Complete Chapter List

Search this Book:
Reset