Skip to main content

Enacting Information Security Policies in Practice: Three Modes of Policy Compliance

  • Chapter
Materiality, Rules and Regulation

Part of the book series: Technology, Work and Globalization ((TWG))

Abstract

Widely reported information security breaches and their high organizational impact have underlined the importance of organizational information security. Based on an international survey in the Harvard Business Review (2013, 2), ‘information security and privacy have become more significant areas of concern in the past three years’. In addition, in a large industry survey that ‘gathered data by surveying 11,340 directors and 1,957 general counsel’ conducted by The Corporate Board Member and FTI Consulting (2012, 2), within corporate America, information security concerns topped the list of concerns of both surveyed groups. To protect their information, organizations devote much time and resources to implement information security policies (hereafter InfoSec policies). These policies form the core of organization’s information security efforts (Baskerville and Siponen, 2002; Doherty et al., 2009) by documenting guidelines for employees’ expected behaviour (Warkentin and Johnston, 2008). However, the potential of the policies arises not from the documents per se, but from employees’ compliance with the implemented policies (Bulgurcu et al., 2010). It is, therefore, no wonder that scholars have devoted much time and effort to study policy compliance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Anderson, C. L. & Agarwal, R. (2010). Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioural Intentions. MIS Quarterly, 34 (3), 613–643.

    Google Scholar 

  • Barad, K. (2003). Posthumanist Performativity: Toward an Understanding of How Matter Comes to Matter. Signs: Journal of Women in Culture and Society, 28 (3), 801–831.

    Article  Google Scholar 

  • Barad, K. (2007). Meeting the Universe Halfway: Quantum Physics and the Entanglement of Matter and Meaning. London: Duke University Press.

    Book  Google Scholar 

  • Baskerville, R. & Siponen, M. (2002). An Information Security Meta-policy for Emergent Organizations. Logistics Information Management, 15 (5/6), 337–346.

    Article  Google Scholar 

  • Baudrillard, J. (1981). For a Critique of the Political Economy of the Sign. St Louis, MO: Telos Press Publishing.

    Google Scholar 

  • Bratteteig, T. & Verne, G. B. (2012). Conditions for Autonomy in the Information Society: Disentangling as a Public Service. Scandinavian Journal of Information Systems, 24 (2), 1–28.

    Google Scholar 

  • Bulgurcu, B., Cavusoglu, H. & Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness. MIS Quarterly, 34 (3), 523–548.

    Google Scholar 

  • Carlile, P. R., Nicolini, D., Langley, A. & Tsoukas, H. (eds) (2013). How Matter Matters: Objects, Artefacts, and Materiality in Organization Studies. Oxford: Oxford University Press.

    Google Scholar 

  • Coles-Kemp, L. (2009). Information Security Management: An Entangled Research Challenge. Information Security Technical Report, 14 (4), 181–185.

    Article  Google Scholar 

  • Corporate Board Member & FTI Consulting (2012). Legal Risks on the Radar: 2012 Law and Boardroom Study. Brentwood, TN: The Corporate Board Member & FTI Consulting, Inc.

    Google Scholar 

  • Dale, K. (2005). Building a Social Materiality: Spatial and Embodied Politics in Organizational Control. Organization, 12 (5), 649–678.

    Article  Google Scholar 

  • Dant, T. (1996). Fetishism and the Social Value of Objects. The Sociological Review, 44 (3), 495–516.

    Article  Google Scholar 

  • Doherty, N. F., Anastasakis, L. & Fulford, H. (2009). The Information Security Policy Unpacked: A Critical Study of the Content of University Policies. International Journal of Information Management, 29 (6), 449–457.

    Article  Google Scholar 

  • Ellen, R. (1988). Fetishism. Man, 23 (2), 213–235.

    Article  Google Scholar 

  • Harvard Business Review (2013). Meeting the Cyber Risk Challenge. Harvard Business Review Analytic Services. Available at: http://www.ferma.eu/blog/2012/11/complimentary-audio-webinar-meeting-the-cyber-risk-challenge/.

    Google Scholar 

  • Herath, T. & Rao, H. R. (2009). Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of Information Systems, 18 (2), 106–125.

    Article  Google Scholar 

  • Höne, K. & Eloff, J. H. P. (2002). Information Security Policy — What Do International Information Security Standards Say? Computers & Security, 21 (5), 402–409.

    Article  Google Scholar 

  • Hsu, C. W. (2009). Frame Misalignment: Interpreting the Implementation of Information Systems Security Certification in an Organization. European Journal of Information Systems, 18 (2), 140–150.

    Article  Google Scholar 

  • Ifinedo, P. (2014). Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition. Information & Management, 51 (1), 69–79.

    Article  Google Scholar 

  • ISO/IEC 2013, ISO/IEC 27001: Information Technology — Security Techniques — Information on Security Management Systems — Requirements. Geneva, Switzerland: ISO/IEC.

    Google Scholar 

  • ISO/IEC 2014, ISO/IEC 27002 Information Technology — Security Techniques — Information Security Management Systems — Overview and Vocabulary. Geneva, Switzerland: ISO/IEC.

    Google Scholar 

  • Johnston, A. C. & Warkentin, M. (2010). Fear Appeals and Information Security Behaviours: An Empirical Study. MIS Quarterly, 34 (3), 549–566.

    Google Scholar 

  • Jones, M. (2014). A Matter of Life and Death: Exploring Conceptualizations of Sociomateriality in the Context of Critical Care. MIS Quarterly, 38 (3), 895–925.

    Google Scholar 

  • Kvale, S. (1996). Interviews: An Introduction to Qualitative Research Interviewing. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Langley, A. (1999). Strategies for Theorizing from Process Data. The Academy of Management Review, 24 (4), 691–710.

    Google Scholar 

  • Leonardi, P. M. (2013). Theoretical Foundations for the Study of Sociomateriality. Information and Organization, 23 (2), 59–76.

    Article  Google Scholar 

  • Leonardi, P. M. & Barley, S. R. (2008). Materiality and Change: Challenges to Building Better Theory About Technology and Organizing. Information and Organization, 18 (3), 159–176.

    Article  Google Scholar 

  • Mazmanian, M., Cohn, M. & Dourish, P. (2014). Dynamic Reconfiguration in Planetary Exploration: A Sociomaterial Ethnography. MIS Quarterly, 38 (3), 1–18.

    Google Scholar 

  • Miles, M. B. & Huberman, A. M. (1994). Qualitative Data Analysis: An Expanded Sourcebook. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Njenga, K. & Brown, I. (2012). Conceptualising Improvisation in Information Systems Security. European Journal of Information Systems, 21, 592–607.

    Article  Google Scholar 

  • Nyberg, D. (2009). Computers, Customer Service Operatives and Cyborgs: Intra-actions in Call Centres. Organization Studies, 30 (11), 1181–1199.

    Article  Google Scholar 

  • Orlikowski, W. J. (2007). Sociomaterial Practices: Exploring Technology at Work. Organization Studies, 28 (9), 1435–1448.

    Article  Google Scholar 

  • Orlikowski, W. J. & Scott, S. V. (2008). Sociomateriality: Challenging the Separation of Technology, Work and Organization. The Academy of Management Annals, 2 (1), 433–474.

    Article  Google Scholar 

  • Osterlie, T., Almklov, P. G. & Hepsø, V. (2012). Dual Materiality and Knowing in Petroleum Production. Information and Organization, 22 (2), 85–105.

    Article  Google Scholar 

  • Pahnila, S., Karjalainen, M. & Siponen, M. (2013). Information Security Behaviour: Towards Multi-stage Models. Pacific Asia Conference on Information Systems (PACIS) 2013, 1–16.

    Google Scholar 

  • Pahnila, S., Siponen, M. & Mahmood, A. (2007). Employees’ Behaviour towards IS Security Policy Compliance. Proceedings of the 40th Annual Hawaii International Conference on Systems Sciences (HICSS), 156b.

    Google Scholar 

  • Pels, P. (1998). 4 The Spirit of Matter: On Fetish, Rarity, Fact, and Fancy. In P. Spyer (ed.), Border Fetishism: Material Objects in Unstable Spaces, 91–121. New York: Routledge.

    Google Scholar 

  • Pels, D., Hetherington, K. & Vandenberghe, F. (2002). The Status of the Object: Performances, Mediations, and Techniques. Theory, Culture & Society, 19 (1), 1–21.

    Article  Google Scholar 

  • Pickering, A. (2008). The Mangle in Practice: Science, Society, and Becoming. Durham, UK: Duke University Press.

    Book  Google Scholar 

  • Puhakainen, P. & Siponen, M. (2010). Improving Employees’ Compliance through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34 (4), 757–778.

    Google Scholar 

  • Rouse, J. (2004). Barad’s Feminist Naturalism. Hypatia, 19 (1), 142–161.

    Article  Google Scholar 

  • Schatzki, T. R., Cetina, K. K. & von Savigny, E. (eds) (2001). The Practice Turn in Contemporary Theory. London: Routledge.

    Google Scholar 

  • Schultze, U. (2011). The Avatar as Sociomaterial Entanglement: A Performative Perspective on Identity, Agency and World-Making in Virtual Worlds. Thirty Second International Conference on Information Systems (ICIS), 1–18, Shanghai, China.

    Google Scholar 

  • Schultze, U. (2012). Performing Embodied Identity in Virtual Worlds. European Journal of Information Systems, 23 (1), 84–95.

    Article  Google Scholar 

  • Scott, S. V. & Orlikowski, W. J. (2013). Sociomateriality — Taking the Wrong Turning? A Response to Mutch. Information and Organization, 23 (2), 77–80.

    Article  Google Scholar 

  • Scott, S. V. & Orlikowski, W. J. (2014). Entanglements in Practice: Performing Anonymity through Social Media. MIS Quarterly, 38 (3), 863–893.

    Google Scholar 

  • Silva, S. (2013). Reification and Fetishism: Processes of Transformation. Theory, Culture & Society, 30 (1), 79–98.

    Article  Google Scholar 

  • Siponen, M., Pahnila, S. & Mahmood, A. (2006). Factors Influencing Protection Motivation and IS Security Policy Compliance. Innovations in Information Technology, 2006, 1–5.

    Google Scholar 

  • Siponen, M. & Willison, R. (2007). A Critical Assessment of IS Security Research Between 1990–2004. Proceedings of European Conference on Information Systems (ECIS), 1551–1559, St. Gallen, Switzerland.

    Google Scholar 

  • Stahl, B. C. (2008). Design as Reification, Commodification, and Ideology: A Critical View of IS Design Science. Proceedings of European Conference on Information Systems (ECIS), 1–12. Galway, Ireland.

    Google Scholar 

  • Stahl, B. C., Tremblay, M. C. & LeRouge, C. M. (2011). Focus Groups and Critical Social IS Research: How the Choice of Method Can Promote Emancipation of Respondents and Researchers. European Journal of Information Systems, 20 (3), 378–394.

    Article  Google Scholar 

  • Stahl, B., Doherty, N. & Shaw, M. (2012). Information Security Policies in the UK Healthcare Sector: A Critical Evaluation. Information Systems Journal, 22 (1), 77–94.

    Article  Google Scholar 

  • Taureck, R. (2006). Securitization Theory and Securitization Studies. Journal of International Relations and Development, 9, 53–61.

    Article  Google Scholar 

  • Warkentin, M. & Johnston, A. C. (2008). IT Governance and Organizational Design for Security Management. In D. W. Straub, S. E. Goodman & R. Baskerville (eds), Information Security: Policy, Processes and Practices, 46–68. Armonk, NY: M. E. Sharpe.

    Google Scholar 

  • Warkentin, M. & Willison, R. (2009). Behaviour and Policy Issues in Information Systems Security: The Insider Threat. European Journal of Information Systems, 18, 101–105.

    Article  Google Scholar 

  • Whitman, M. E. (2008). Security Policy: From Design to Maintenance. In D. W. Straub, S. Goodman & R. L. Baskerville (eds), Information Security: Policy, Processes and Practices, 123–151. Armonk, NY: M. E. Sharpe.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Marko Niemimaa and Anna Elina Laaksonen

About this chapter

Cite this chapter

Niemimaa, M., Laaksonen, A.E. (2015). Enacting Information Security Policies in Practice: Three Modes of Policy Compliance. In: de Vaujany, FX., Mitev, N., Lanzara, G.F., Mukherjee, A. (eds) Materiality, Rules and Regulation. Technology, Work and Globalization. Palgrave Macmillan, London. https://doi.org/10.1057/9781137552648_12

Download citation

Publish with us

Policies and ethics