Review of IS security policy compliance
An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to underst...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | article |
| Published: |
2017
|
| Online Access: | http://hdl.handle.net/10725/6154 http://dx.doi.org/10.1145/3130515.3130518 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://dl.acm.org/citation.cfm?id=3130518 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1864513478605144064 |
|---|---|
| author | Balozian, Puzant |
| author2 | Leidner, Dorothy |
| author2_role | author |
| author_facet | Balozian, Puzant Leidner, Dorothy |
| author_role | author |
| dc.creator.none.fl_str_mv | Balozian, Puzant Leidner, Dorothy |
| dc.date.none.fl_str_mv | 2017-09-07T09:55:32Z 2017-09-07T09:55:32Z 2017 2017-09-07 |
| dc.identifier.none.fl_str_mv | 1532-0936 http://hdl.handle.net/10725/6154 http://dx.doi.org/10.1145/3130515.3130518 Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: Toward the building blocks of an IS security theory. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48(3), 11-43. http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://dl.acm.org/citation.cfm?id=3130518 |
| dc.language.none.fl_str_mv | en |
| dc.relation.none.fl_str_mv | The Data Base for Advances in Information Systems |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.title.none.fl_str_mv | Review of IS security policy compliance toward the building blocks of an IS security theory |
| dc.type.none.fl_str_mv | Article info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/article |
| description | An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent and malicious insiders. We begin by defining the terms, developing a new taxonomy of insiders, and then providing a comprehensive review of articles on IS policy compliance for the past 26 years. Grounding the analysis in the literature, we inductively identify four themes to foster Information Security policy compliance among employees. The themes are: 1) IS management philosophy, 2) procedural countermeasures, 3) technical countermeasures, and 4) environmental countermeasures. We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory. |
| eu_rights_str_mv | openAccess |
| format | article |
| id | LAURepo_e2ba08c63f1bdd6f7f5e29bde32e00a3 |
| identifier_str_mv | 1532-0936 Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: Toward the building blocks of an IS security theory. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48(3), 11-43. |
| language_invalid_str_mv | en |
| network_acronym_str | LAURepo |
| network_name_str | Lebanese American University repository |
| oai_identifier_str | oai:laur.lau.edu.lb:10725/6154 |
| publishDate | 2017 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | Review of IS security policy compliancetoward the building blocks of an IS security theoryBalozian, PuzantLeidner, DorothyAn understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent and malicious insiders. We begin by defining the terms, developing a new taxonomy of insiders, and then providing a comprehensive review of articles on IS policy compliance for the past 26 years. Grounding the analysis in the literature, we inductively identify four themes to foster Information Security policy compliance among employees. The themes are: 1) IS management philosophy, 2) procedural countermeasures, 3) technical countermeasures, and 4) environmental countermeasures. We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory.PublishedN/A2017-09-07T09:55:32Z2017-09-07T09:55:32Z20172017-09-07Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article1532-0936http://hdl.handle.net/10725/6154http://dx.doi.org/10.1145/3130515.3130518Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: Toward the building blocks of an IS security theory. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48(3), 11-43.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttp://dl.acm.org/citation.cfm?id=3130518enThe Data Base for Advances in Information Systemsinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/61542021-03-19T09:10:09Z |
| spellingShingle | Review of IS security policy compliance Balozian, Puzant |
| status_str | publishedVersion |
| title | Review of IS security policy compliance |
| title_full | Review of IS security policy compliance |
| title_fullStr | Review of IS security policy compliance |
| title_full_unstemmed | Review of IS security policy compliance |
| title_short | Review of IS security policy compliance |
| title_sort | Review of IS security policy compliance |
| url | http://hdl.handle.net/10725/6154 http://dx.doi.org/10.1145/3130515.3130518 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://dl.acm.org/citation.cfm?id=3130518 |