Reference Hub13
A Composite Framework for Behavioral Compliance with Information Security Policies

A Composite Framework for Behavioral Compliance with Information Security Policies

Salvatore Aurigemma
Copyright: © 2013 |Volume: 25 |Issue: 3 |Pages: 20
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781466633193|DOI: 10.4018/joeuc.2013070103
Cite Article Cite Article

MLA

Aurigemma, Salvatore. "A Composite Framework for Behavioral Compliance with Information Security Policies." JOEUC vol.25, no.3 2013: pp.32-51. http://doi.org/10.4018/joeuc.2013070103

APA

Aurigemma, S. (2013). A Composite Framework for Behavioral Compliance with Information Security Policies. Journal of Organizational and End User Computing (JOEUC), 25(3), 32-51. http://doi.org/10.4018/joeuc.2013070103

Chicago

Aurigemma, Salvatore. "A Composite Framework for Behavioral Compliance with Information Security Policies," Journal of Organizational and End User Computing (JOEUC) 25, no.3: 32-51. http://doi.org/10.4018/joeuc.2013070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned behavior, a composite model is presented that incorporates the strengths of previous studies while minimizing theoretical gaps present in other behavioral compliance models. In building the framework, related operational constructs are examined and normalized to allow better comparison of past studies and help focus future research efforts.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.