Review of IS security policy compliance

An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to underst...

Full description

Saved in:
Bibliographic Details
Main Author: Balozian, Puzant (author)
Other Authors: Leidner, Dorothy (author)
Format: article
Published: 2017
Online Access:http://hdl.handle.net/10725/6154
http://dx.doi.org/10.1145/3130515.3130518
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://dl.acm.org/citation.cfm?id=3130518
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513478605144064
author Balozian, Puzant
author2 Leidner, Dorothy
author2_role author
author_facet Balozian, Puzant
Leidner, Dorothy
author_role author
dc.creator.none.fl_str_mv Balozian, Puzant
Leidner, Dorothy
dc.date.none.fl_str_mv 2017-09-07T09:55:32Z
2017-09-07T09:55:32Z
2017
2017-09-07
dc.identifier.none.fl_str_mv 1532-0936
http://hdl.handle.net/10725/6154
http://dx.doi.org/10.1145/3130515.3130518
Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: Toward the building blocks of an IS security theory. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48(3), 11-43.
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://dl.acm.org/citation.cfm?id=3130518
dc.language.none.fl_str_mv en
dc.relation.none.fl_str_mv The Data Base for Advances in Information Systems
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.title.none.fl_str_mv Review of IS security policy compliance
toward the building blocks of an IS security theory
dc.type.none.fl_str_mv Article
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/article
description An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent and malicious insiders. We begin by defining the terms, developing a new taxonomy of insiders, and then providing a comprehensive review of articles on IS policy compliance for the past 26 years. Grounding the analysis in the literature, we inductively identify four themes to foster Information Security policy compliance among employees. The themes are: 1) IS management philosophy, 2) procedural countermeasures, 3) technical countermeasures, and 4) environmental countermeasures. We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory.
eu_rights_str_mv openAccess
format article
id LAURepo_e2ba08c63f1bdd6f7f5e29bde32e00a3
identifier_str_mv 1532-0936
Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: Toward the building blocks of an IS security theory. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48(3), 11-43.
language_invalid_str_mv en
network_acronym_str LAURepo
network_name_str Lebanese American University repository
oai_identifier_str oai:laur.lau.edu.lb:10725/6154
publishDate 2017
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Review of IS security policy compliancetoward the building blocks of an IS security theoryBalozian, PuzantLeidner, DorothyAn understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent and malicious insiders. We begin by defining the terms, developing a new taxonomy of insiders, and then providing a comprehensive review of articles on IS policy compliance for the past 26 years. Grounding the analysis in the literature, we inductively identify four themes to foster Information Security policy compliance among employees. The themes are: 1) IS management philosophy, 2) procedural countermeasures, 3) technical countermeasures, and 4) environmental countermeasures. We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory.PublishedN/A2017-09-07T09:55:32Z2017-09-07T09:55:32Z20172017-09-07Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article1532-0936http://hdl.handle.net/10725/6154http://dx.doi.org/10.1145/3130515.3130518Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: Toward the building blocks of an IS security theory. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48(3), 11-43.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttp://dl.acm.org/citation.cfm?id=3130518enThe Data Base for Advances in Information Systemsinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/61542021-03-19T09:10:09Z
spellingShingle Review of IS security policy compliance
Balozian, Puzant
status_str publishedVersion
title Review of IS security policy compliance
title_full Review of IS security policy compliance
title_fullStr Review of IS security policy compliance
title_full_unstemmed Review of IS security policy compliance
title_short Review of IS security policy compliance
title_sort Review of IS security policy compliance
url http://hdl.handle.net/10725/6154
http://dx.doi.org/10.1145/3130515.3130518
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://dl.acm.org/citation.cfm?id=3130518