Skip to main content
Log in

Organizational information security policies: a review and research framework

  • Literature Review
  • Published:
European Journal of Information Systems

Abstract

A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources should behave in order to prevent, detect, and respond to security incidents. However, this growing (and at times, conflicting) body of research has made it challenging for researchers and practitioners to comprehend the current state of knowledge on the formation, implementation, and effectiveness of security policies in organizations. Accordingly, the purpose of this paper is to synthesize what we know and what remains to be learned about organizational information security policies, with an eye toward a holistic understanding of this research stream and the identification of promising paths for future study. We review 114 influential security policy-related journal articles and identify five core relationships examined in the literature. Based on these relationships, we outline a research framework that synthesizes the construct linkages within the current literature. Building on our analysis of these results, we identify a series of gaps and draw on additional theoretical perspectives to propose a revised framework that can be used as a basis for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2

Similar content being viewed by others

References

  • Aksulu A and Wade M (2010) A comprehensive review and synthesis of open source research. Journal of the Association for Information Systems 11(11), 576–656.

    Google Scholar 

  • Al-Mukahal HM and Alshare K (2015) An examination of factors that influence the number of information security policy violations in qatari organizations. Information and Computer Security 23(1), 102–118.

    Article  Google Scholar 

  • Albrechtsen E (2007) A qualitative study of user’s view on information security. Computers and Security 26(4), 276–289.

    Article  Google Scholar 

  • Alter S (2008a) Defining information systems as work systems: Implications for the IS field. European Journal of Information Systems 17(5), 448–469.

    Article  Google Scholar 

  • Alter S (2008b) Service system fundamentals: Work system, value chain, and life cycle. IBM Systems Journal 47(1), 71–85.

    Article  Google Scholar 

  • Alter S (2013) Work system theory: Overview of core concepts, extensions, and challenges for the future. Journal of the Association for Information Systems 14(2), 72–121.

    Google Scholar 

  • Anderson CL and Agarwal R (2010) Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly 34(3), 613–643.

    Article  Google Scholar 

  • Angst C, Block E, D’arcy J and Kelley K (2017) When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Quarterly Forthcoming.

  • Aurigemma S and Leonard L (2015) The influence of employee affective organizational commitment on security policy attitudes and compliance intentions. Journal of Information System Security 11(3), 201–222.

    Google Scholar 

  • Backhouse J, Hsu CW and Silva L (2006) Circuits of power in creating de jure standards: Shaping an international information systems security standard. MIS Quarterly 30(Special Issue), 413–438.

  • Bandara W, Furtmueller E, Gorbacheva E, Miskon S and Beekhuyzen J (2015) Achieving rigor in literature reviews: Insights from qualitative data analysis and tool-support. Communications of the Association for Information Systems 34(8), 154–204.

    Google Scholar 

  • Banerjee D, Cronan TP and Jones TW (1998) Modeling IT ethics: A study in situational ethics. MIS Quarterly 22(1), 31–60.

    Article  Google Scholar 

  • Barlow JB, Warkentin M, Ormond D and Dennis AR (2013) Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Computers and Security 39(Part B), 145–159.

  • Basin D, Jugé V, Klaedtke F and Zălinescu E (2013) Enforceable security policies revisited. ACM Transactions on Information and System Security 16(1), 1–26.

    Article  Google Scholar 

  • Baskerville R, Park EH and Kim J (2014) An emote opportunity model of computer abuse. Information Technology and People 27(2), 155–181.

    Article  Google Scholar 

  • Baskerville R and Siponen M (2002) An information security meta-policy for emergent organizations. Logistics Information Management 15(5/6), 337–346.

    Article  Google Scholar 

  • Bauer JM and Van Eeten MJG (2009) Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommunications Policy 33(10–11), 706–719.

    Article  Google Scholar 

  • Bauer L, Ligatti J and Walker D (2009) Composing expressive runtime security policies. ACM Transactions on Software Engineering and Methodology 18(3), 1–43.

    Article  Google Scholar 

  • Bijlsma-Frankema KM and Costa AC (2010) Consequences and antecedents of managerial and employee legitimacy interpretations of control: A natural open system approach. In Organizational Control (SITKIN SB, CARDINAL LB and BIJLSMA-FRANKEMA KM, Eds), pp 396–433, Cambridge University Press, Cambridge.

    Chapter  Google Scholar 

  • Boss SR, Galletta D, Moody GD, Lowry PB and Polak P (2015) What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users. MIS Quarterly 39(4), 837–864.

    Article  Google Scholar 

  • Boss SR, Kirsch LJ, Angermeier I, Shingler RA and Boss RW (2009) If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. European Journal of Information Systems 18(2), 151–164.

    Article  Google Scholar 

  • Bulgurcu B, Cavusoglu H and Benbasat I (2010) Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34(3), 523–548.

    Article  Google Scholar 

  • Burns AJ, Roberts TL, Posey C and Lowry PB (2017) Examining the influence of organisational insiders’ psychological capital on information security threat and coping appraisals. Computers in Human Behavior 68, 190–209.

  • Burton-Jones A, Mclean ER and Monod E (2015) Theoretical perspectives in IS research: From variance and process to conceptual latitude and conceptual fit. European Journal of Information Systems 24(6), 664–679.

    Article  Google Scholar 

  • Cairney P (2013) Standing on the shoulders of giants: How do we combine the insights of multiple theories in public policy studies? The Policy Studies Journal 41(1), 1–21.

    Article  Google Scholar 

  • Chan M, Woon I and Kankanhalli A (2005) Perceptions of information security in the workplace: Linking information security climate to compliant behavior. Journal of Information Privacy and Security 1(3), 18–41.

    Article  Google Scholar 

  • Chatterjee S, Sarker S and Valacich JS (2015) The behavioral roots of information systems security: Exploring key factors related to unethical IT use. Journal of Management Information Systems 31(4), 49–87.

    Article  Google Scholar 

  • Chen Y, Ramamurthy K and Wen K-W (2012) Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems 29(3), 157–188.

    Article  Google Scholar 

  • Chen Y, Ramamurthy K and Wen K-W (2015) Impacts of comprehensive information security programs on information security culture. The Journal of Computer Information Systems 55(3), 11–19.

    Article  Google Scholar 

  • Chen Y and Zahedi FM (2016) Individuals’ internet security perceptions and behaviors: Polycontextual contrasts between the United States and China. MIS Quarterly 40(1), 205–222.

    Article  Google Scholar 

  • Cheng L, Li Y, Li W, Holm E and Zhai Q (2013) Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers and Security 39, 447–459.

  • Choudhury V and Sabherwal R (2003) Portfolios of control in outsourced software development projects. Information Systems Research 14(3), 291–314.

    Article  Google Scholar 

  • Chu AMY, Chau PYK and So MKP (2015) Developing a typological theory using a quantitative approach: A case of information security deviant behavior. Communications of the AIS 37(25), 510–535.

    Google Scholar 

  • Chu MY, So MKP and Chung RSW (2016) Applying the randomized response technique in business ethics research: The misuse of information systems resources in the workplace. Journal of Business Ethics Online Early, 1–18.

  • Chua CEH, Lim W-K, Soh C and Sia SK (2012) Enacting clan control in complex IT projects: A social capital perspective. MIS Quarterly 36(2), 577–600.

    Google Scholar 

  • Cram WA, Brohman MK and Gallupe RB (2016a) Hitting a moving target: A process model of information systems control change. Information Systems Journal 26(3), 195–226.

    Article  Google Scholar 

  • Cram WA, Brohman MK and Gallupe RB (2016b) Information systems control: A review and framework for emerging information systems. Journal of the Association for Information Systems 17(4), 216–266.

    Google Scholar 

  • Cronan TP and Douglas DE (2006) Toward a comprehensive ethical behavior model for information technology. Journal of Organizational and End User Computing 18(1), 1–11.

  • Crossler RE and Bélanger F (2009) The effects of security education training and awareness programs and individual characteristics on end user security tool usage. Journal of Information System Security 5(3), 3–22.

    Google Scholar 

  • Crossler RE, Johnston AC, Lowry PB, Hu Q, Warkentin M and Baskerville R (2013) Future directions for behavioral information security research. Computers and Security 32, 90–101.

  • Crossler RE, Long JH, Loraas TM and Trinkle BS (2014) Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap. Journal of Information Systems 28(1), 209–226.

    Article  Google Scholar 

  • Culnan MJ and Williams CC (2009) How ethics can enhance organizational privacy: Lessons from the Choicepoint and TJX data breaches. MIS Quarterly 33(4), 673–687.

    Article  Google Scholar 

  • Cuppens F, Cuppens-Boulahia N and Elrakaiby Y (2013) Formal specification and management of security policies with collective group obligations. Journal of Computer Security 21(1), 149–190.

    Article  Google Scholar 

  • D’arcy J and Devaraj S (2012) Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences 43(6), 1091–1124.

    Article  Google Scholar 

  • D’arcy J and Greene G (2014) Security culture and the employment relationship as drivers of employees’ security compliance. Information Management and Computer Security 22(5), 474–489.

    Article  Google Scholar 

  • D’arcy J and Herath T (2011) A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems 29(6), 643–658.

    Article  Google Scholar 

  • D’arcy J, Herath T and Shoss MK (2014) Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems 31(2), 285–318.

    Article  Google Scholar 

  • D’arcy J and Hovav A (2007) Deterring internal information systems abuse. Communications of the ACM 50(10), 113–117.

    Article  Google Scholar 

  • D’arcy J, Hovav A and Galletta D (2009) User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1), 79–98.

    Article  Google Scholar 

  • David J (2002) Policy enforcement in the workplace. Computers and Security 21(6), 506–513.

    Article  Google Scholar 

  • Davis RC (1940) Industrial Organization and Management. Harper, New York.

    Google Scholar 

  • Dhillon G (1997) Managing Information Security. Macmillan, London.

    Google Scholar 

  • Dhillon G and Backhouse J (2000) Information system security management in the new millennium. Communications of the ACM 43(7), 125–128.

    Article  Google Scholar 

  • Dhillon G and Backhouse J (2001) Current directions in IS security research: Towards socio-organizational perspectives. Information Systems Journal 11(2), 127–153.

    Article  Google Scholar 

  • Di Modica G and Tomarchio O (2016) Matchmaking semantic security policies in heterogeneous clouds. Future Generation Computer Systems 55, 176–185.

  • Dimaggio PJ (1988) Interest and agency in institutional theory. In Institutional patterns and organizations (ZUCKER LG, Ed), pp 3–21, Ballinger, Cambridge.

    Google Scholar 

  • Dinev T, Goo J, Hu Q and Nam K (2009) User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal 19(4), 391–412.

    Article  Google Scholar 

  • Dinev T and Hu Q (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems 8(7), 386–408.

    Google Scholar 

  • Doherty NF, Anastasakis L and Fulford H (2009) The information security policy unpacked: A critical study of the content of university policies. International Journal of Information Management 29(6), 449–457.

    Article  Google Scholar 

  • Doherty NF and Fulford H (2005) Do information security policies reduce the incidence of security breaches: An exploratory analysis. Information Resources Management Journal 18(4), 21–39.

    Article  Google Scholar 

  • Doherty NF and Fulford H (2006) Aligning the information security policy with the strategic information systems plan. Computers and Security 25(1), 55–63.

    Article  Google Scholar 

  • Eisenhardt KM (1985) Control: Organizational and economic approaches. Management Science 31(2), 134–149.

    Article  Google Scholar 

  • Eisenhardt KM (1989) Agency theory: An assessment and review. Academy of Management Review 14(1), 57–74.

    Google Scholar 

  • Evanschitzky H and Armstrong JS (2013) Research with in-built replications: Comment and further suggestions for replication research. Journal of Business Research 66(9), 1406–1408.

    Article  Google Scholar 

  • Flamholtz EG, Das TK and Tsui AS (1985) Toward and integrative framework of organizational control. Accounting, Organizations and Society 10(1), 35–50.

    Article  Google Scholar 

  • Flowerday SV and Tuyikeze T (2016) Information security policy development and implementation: The what, how and who. Computers and Security 61, 169–183.

  • Foley SN and Fitzgerald WM (2011) Management of security policy configuration using a semantic threat graph approach. Journal of Computer Security 19(3), 567–605.

    Article  Google Scholar 

  • Foth M (2016) Factors influencing the intention to comply with data protection regulations in hospitals: Based on gender differences in behaviour and deterrence. European Journal of Information Systems 25(2), 91–109.

    Article  Google Scholar 

  • Fulford H and Doherty NF (2003) The application of information security policies in large UK-based organizations: An exploratory investigation. Information Management & Computer Security 11(3), 106–114.

    Article  Google Scholar 

  • Gaunt N (1998) Installing an appropriate information security policy. International Journal of Medical Informatics 49(1), 131–134.

    Article  Google Scholar 

  • Goel S and Chengalur-Smith IN (2010) Metrics for characterizing the form of security policies. Journal of Strategic Information Systems 19(4), 281–295.

    Article  Google Scholar 

  • Goo J, Yim M-S and Kim DJ (2014) A path to successful management of employee security compliance: An empirical study of information security climate. IEEE Transactions on Professional Communication 57(4), 286–308.

    Article  Google Scholar 

  • Gopal A and Gosain S (2010) The role of organizational controls and boundary spanning in software development outsourcing: Implications for project performance. Information Systems Research 21(4), 1–23.

    Article  Google Scholar 

  • Grahlmann KR, Helms RW, Hilhorst C, Brinkkemper S and Van Amerongen S (2012) Reviewing enterprise content management: A functional framework. European Journal of Information Systems 21(3), 268–286.

    Article  Google Scholar 

  • Gregory RW, Beck R and Keil M (2013) Control balancing in information systems development offshoring projects. MIS Quarterly 37(4), 1211–1232.

    Article  Google Scholar 

  • Gritzalis D (1997) A baseline security policy for distributed healthcare information systems. Computers and Security 16(8), 709–719.

    Article  Google Scholar 

  • Guo KH (2013) Security-related behavior in using information systems in the workplace: A review and synthesis. Computers and Security 32, 242–251.

  • Guo KH and Yuan Y (2012) The effects of multilevel sanctions on information security violations: A mediating model. Information and Management 49(6), 320–326.

    Article  Google Scholar 

  • Guo KH, Yuan Y, Archer NP and Connelly CE (2011) Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems 28(2), 203–236.

    Article  Google Scholar 

  • Han J, Kim YJ and Kim H (2017) An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. Computers and Security 66, 52–65.

  • Harrington SJ (1996) The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions. MIS Quarterly 20(3), 257-278.

    Article  Google Scholar 

  • Hassan NR (2014) Useful products in theorizing for information systems. In Thirty Fifth International Conference on Information Systems pp 1–21, Auckland.

  • Hassan NR and Lowry PB (2015) Seeking middle-range theories in information systems research. In Thirty Sixth International Conference on Information Systems pp 1–19, Fort Worth.

  • Hedström K, Kolkowska E, Karlsson F and Allen J (2011) Value conflicts for information security management. Journal of Strategic Information Systems 20(4), 373–384.

    Article  Google Scholar 

  • Helson R, Jones C and Kwan VSY (2002) Personality change over 40 years of adulthood: Hierarchical linear modeling analyses of two longitudinal samples. Journal of Personality and Social Psychology 83(3), 752–766.

    Article  Google Scholar 

  • Herath T, Chen R, Wang J, Banjara K, Wilbur J and Rao HR (2014) Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal 24(1), 61–84.

    Article  Google Scholar 

  • Herath T and Rao HR (2009a) Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems 47(2), 154–165.

    Article  Google Scholar 

  • Herath T and Rao HR (2009b) Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems 18(2), 106–125.

    Article  Google Scholar 

  • Hicks B, Rueda S, St. Clair L, Jaeger T and Mcdaniel P (2010) A logical specification and analysis for SELinux MLS policy. ACM Transactions on Information and System Security 13(3), 1–31.

    Article  Google Scholar 

  • Hofstede G (1978) The poverty of management control philosophy. Academy of Management Review 3(3), 450–461.

    Google Scholar 

  • Höne K and Eloff JHP (2002a) Information security policy—what do international information security standards say? Computers and Security 21(5), 402–409.

    Article  Google Scholar 

  • Höne K and Eloff JHP (2002b) What makes an effective information security policy? Network Security 20(6), 14–16.

    Article  Google Scholar 

  • Hong K-S, Chi Y-P, Chao LR and Tang J-H (2006) An empirical study of information security policy on information security elevation in Taiwan. Information Management and Computer Security 14(2), 104–115.

    Article  Google Scholar 

  • Horcas J-M, Pinto M, Fuentes L, Mallouli W and Montes de Oca E (2016) An approach for deploying and monitoring dynamic security policies. Computers and Security 58, 20–38.

  • Hovav A and D’arcy J (2012) Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea. Information and Management 49(2), 99–110.

    Article  Google Scholar 

  • Hsu JS-C, Shih S-P, Hung YW and Lowry PB (2015) The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research 26(2), 282–300.

    Article  Google Scholar 

  • Hu Q, Dinev T, Hart P and Cooke D (2012) Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences 43(4), 615–659.

    Article  Google Scholar 

  • Hu Q, West R and Smarandescu L (2015) The role of self-control in information security violations: Insights from a cognitive neuroscience perspective. Journal of Management Information Systems 31(4), 6–48.

    Article  Google Scholar 

  • Hu Q, Xu Z, Dinev T and Ling H (2011) Does deterrence work in reducing information security policy abuse by employees? Communications of the ACM 54(6), 54–60.

    Article  Google Scholar 

  • Hwang I, Kim D, Kim T and Kim S (2017) Why not comply with information security? An empirical approach for the causes of non-compliance. Online Information Review 41(1), 2–18.

    Article  Google Scholar 

  • Ifinedo P (2012) Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security 31(1), 83–95.

    Article  Google Scholar 

  • Ifinedo P (2014) Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information and Management 51(1), 69–79.

    Article  Google Scholar 

  • Ifinedo P (2016) Critical times for organizations: What should be done to curb workers’ noncompliance with IS security policy guidelines? Information Systems Management 33(1), 30–41.

    Article  Google Scholar 

  • International Organization For Standardization (2016) ISO/IEC 27000:2016. https://www.iso.org, accessed 30 January 2016.

  • Jaffee D (1991) Organization Theory: Tension and Change. McGraw-Hill, New York.

    Google Scholar 

  • Jajodia S, Samarati P, Sapino ML and Subrahmanian VS (2001) Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2), 214–260.

    Article  Google Scholar 

  • Jensen M and Meckling W (1976) Theory of the firm: Managerial behavior, agency costs, and ownership structure. Journal of Financial Economics 3(4), 305–360.

    Article  Google Scholar 

  • Johnston AC and Warkentin M (2010a) Fear appeals and information security behaviors: An empirical study. MIS Quarterly 34(3), 549–566.

    Article  Google Scholar 

  • Johnston AC and Warkentin M (2010b) The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions. Journal of Organizational and End User Computing 22(3), 1–21.

    Article  Google Scholar 

  • Johnston AC, Warkentin M, Mcbride M and Carter L (2016) Dispositional and situational factors: Influences on information security policy violations. European Journal of Information Systems 25(3), 231–251.

    Article  Google Scholar 

  • Johnston AC, Warkentin M and Siponen M (2015) An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly 39(1), 113–134.

    Article  Google Scholar 

  • Johnston AC, Wech B and Jack E (2013) Engaging remote employees: The moderating role of “remote” status in determining employee information security policy awareness. Journal of Organizational and End User Computing 25(1), 1–23.

    Article  Google Scholar 

  • Kadam AW (2007) Information security policy development and implementation. Information Systems Security 16(5), 246–256.

    Article  Google Scholar 

  • Kankanhalli A, Teo H-H, Tan BCY and Wei K-K (2003) An integrative study of information systems security effectiveness. International Journal of Information Management 23(2), 139–154.

    Article  Google Scholar 

  • Karjalainen M and Siponen M (2011) Toward a new meta-theory for designing information systems (IS) security training approaches. Journal of the Association for Information Systems 12(8), 518–555.

    Google Scholar 

  • Karlsson F, Åström J and Karlsson M (2015) Information security culture—state-of-the-art review between 2000 and 2013. Information and Computer Security 23(3), 246–285.

    Article  Google Scholar 

  • Karyda M, Kiountouzis E and Kokolakis S (2005) Information systems security policies: A contextual perspective. Computers and Security 24(3), 246–260.

    Article  Google Scholar 

  • Khoury R and Tawbi N (2012) Corrective enforcement: A new paradigm of security policy enforcement by monitors. ACM Transactions on Information and System Security 15(2), 1–27.

    Article  Google Scholar 

  • Kiel JM, Ciamacco FA and Steines BT (2016) Privacy and data security: HIPAA and HITECH. In Healthcare information management systems (WEAVER CA, BALL MJ, KIM GR and KIEL JM, Eds), pp 437–449, Springer, New York.

    Chapter  Google Scholar 

  • Kim J, Park EH and Baskerville R (2016) A model of emotion and computer abuse. Information and Management 53(1), 91–108.

    Article  Google Scholar 

  • King NJ and Raja VT (2012) Protecting the privacy and security of sensitive customer data in the cloud. Computer Law and Security Review 28(3), 308–319.

    Article  Google Scholar 

  • King WR and He J (2005) Understanding the role and methods of meta-analysis in IS research. Communications of the Association for Information Systems 16(32), 665–696.

    Google Scholar 

  • Kirsch LJ (1997) Portfolios of control modes and IS project management. Information Systems Research 8(3), 215–239.

    Article  Google Scholar 

  • Kirsch LJ, Ko D-G and Haney MH (2010) Investigating the antecedents of team-based clan control: Adding social capital as a predictor. Organization Science 21(2), 469–489.

    Article  Google Scholar 

  • Knapp KJ and Ferrante CJ (2012) Policy awareness, enforcement and maintenance: Critical to information security effectiveness in organizations. Journal of Management Policy and Practice 13(5), 66–80.

    Google Scholar 

  • Knapp KJ, Marshall TE, Rainer RK and Ford FN (2006) Information security: Management’s effect on culture and policy. Information Management and Computer Security 14(1), 24–36.

    Article  Google Scholar 

  • Knapp KJ, Morris RFJ, Marshall TE and Byrd TA (2009) Information security policy: An organizational-level process model. Computers and Security 28(7), 493–508.

    Article  Google Scholar 

  • Koops B-J (2014) The trouble with European data protection law. International Data Privacy Law 4(4), 250–261.

    Article  Google Scholar 

  • Landoll DJ (2016) Information Security Policies, Procedures, and Standards. CRC Press, Boca Raton.

    Book  Google Scholar 

  • Langley A (1999) Strategies for theorizing from process data. Academy of Management Review 24(4), 691–710.

    Google Scholar 

  • Lebek B, Uffen J, Breitner MH, Neumann M and Hohler B (2013) Employees’ information security awareness and behavior: A literature review. In 46th Hawaii International Conference on System Sciences pp 2978–2986, Maui, Hawaii.

    Google Scholar 

  • Lebek B, Uffen J, Neumann M, Hohler B and Breitner MH (2014) Information security awareness and behavior: A theory-based literature review. Management Research Review 37(12), 1049–1092.

    Article  Google Scholar 

  • Lee C, Lee CC and Kim S (2016) Understanding information security stress: Focusing on the type of information security compliance activity. Computers and Security 59(1), 60–70.

    Article  Google Scholar 

  • Lee J and Lee Y (2002) A holistic model of computer abuse within organizations. Information Management and Computer Security 10(2), 57–63.

    Article  Google Scholar 

  • Lee SM, Lee S-G and Yoo S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Information and Management 41(6), 707–718.

    Article  Google Scholar 

  • Lee Y and Larson KR (2009) Threat or coping appraisal: Determinants of SMB executives’ decision to adopt anti-malware software. European Journal of Information Systems 18(2), 177–187.

    Article  Google Scholar 

  • Leidner DE and Kayworth T (2006) A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly 30(2), 357–399.

    Article  Google Scholar 

  • Li H, Sarathy R, Zhang J and Luo X (2014) Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Information Systems Journal 24(6), 479–502.

    Article  Google Scholar 

  • Li H, Zhang J and Sarathy R (2010) Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems 48(4), 635–645.

    Article  Google Scholar 

  • Li N and Wang Q (2008) Beyond separation of duty: An algebra for specifying high-level security policies. Journal of the ACM 55(3), 1–46.

    Article  Google Scholar 

  • Liang H and Xue Y (2009) Avoidance of information technology threats: A theoretical perspective. MIS Quarterly 33(1), 71–90.

    Article  Google Scholar 

  • Liang H and Xue Y (2010) Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems 11(7), 394–413.

    Google Scholar 

  • Liang H, Xue Y and Wu L (2013) Ensuring employees’ IT compliance: Carrot or stick? Information Systems Research 24(2), 279–294.

    Article  Google Scholar 

  • Liao Q, Gurung A, Luo X and Li L (2009) Workplace management and employee misuse: Does punishment matter? Journal of Computer Information Systems 50(2), 49–59.

    Google Scholar 

  • Lindsay RM and Ehrenberg ASC (1993) The design of replicated studies. The American Statistician 47(3), 217–222.

    Google Scholar 

  • Liu C-C (2015) Types of employee perceptions of information security using Q methodology: An empirical study. European Journal of Information Systems 10(4), 557–575.

    Google Scholar 

  • Liu J, Li Y, Wang H, Jin D, Su L, Zeng L and Vasilakos T (2016) Leveraging software-defined networking for security policy enforcement. Information Sciences 327, 288–299.

  • Lowry PB and Moody GD (2015) Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. Information Systems Journal 25(5), 465–488.

    Article  Google Scholar 

  • Lowry PB, Posey C, Bennett RJ and Roberts TL (2015) Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust. Information Systems Journal 25(3), 193–230.

    Article  Google Scholar 

  • Lowry PB, Posey C, Roberts TL and Bennett RJ (2014) Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse. Journal of Business Ethics 121(3), 385–401.

    Article  Google Scholar 

  • Macintosh NB (1994) Management Accounting and Control Systems: An Organizational and Behavioral Approach. Wiley, New York.

    Google Scholar 

  • Maruping LM, Venkatesh V and Agarwal R (2009) A control theory perspective on agile methodology use and changing user requirements. Information Systems Research 20(3), 377–399.

    Article  Google Scholar 

  • Mcdaniel P and Prakash A (2006) Methods and limitations of security policy reconciliation. ACM Transactions on Information and System Security 9(3), 259–291.

    Article  Google Scholar 

  • Mehra SK (2010) Law and cybercrime in the United States today. The American Journal of Comparative Law 58, 659–685.

  • Meyer JW and Rowan B (1977) Institutional organizations: Formal structure as a myth and ceremony. American Journal of Sociology 83(2), 340–363.

    Article  Google Scholar 

  • Mezias SJ and Regnier MO (2007) Walking the walk as well as talking the talk: Replication and the normal science paradigm in strategic management research. Strategic Organization 5(3), 283–296.

    Article  Google Scholar 

  • Montanari M, Chan E, Larson K, Yoo W and Campbell RH (2013) Distributed security policy conformance. Computers and Security 33, 28–40.

  • Moody GD, Kirsch LJ, Slaughter SA, Dunn BK and Weng Q (2016) Facilitating the transformational: An exploration of control in cyberinfrastructure projects and the discovery of field control. Information Systems Research 27(2), 324–346.

    Article  Google Scholar 

  • Moores TT and Chang JC-J (2006) Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly 30(1), 167–180.

    Article  Google Scholar 

  • Moquin R and Wakefield RL (2016) The roles of awareness, sanctions, and ethics in software compliance. The Journal of Computer Information Systems 56(3), 261–270.

    Article  Google Scholar 

  • Muthaiyah S and Kerschberg L (2007) Virtual organization security policies: An ontology-based integration approach. Information Systems Frontiers 9(5), 505–514.

    Article  Google Scholar 

  • Myyry L, Siponen M, Pahnila S, Vartiainen T and Vance A (2009) What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems 18(2), 126–139.

    Article  Google Scholar 

  • Ng B-Y, Kankanhalli A and Xu Y (2009) Studying users’ computer security behavior: A health belief perspective. Decision Support Systems 46(4), 815–825.

    Article  Google Scholar 

  • Niehoff BP and Moorman RH (1993) Justice as a mediator of the relationship between methods of monitoring and organizational citizenship behavior. Academy of Management Journal 36(3), 527–556.

    Article  Google Scholar 

  • Osenga K (2013) The internet is not a super highway: Using metaphors to communicate information and communications policy. Journal of Information Policy 3(1), 30–54.

    Article  Google Scholar 

  • Padayachee K (2012) Taxonomy of compliant information security behavior. Computers and Security 31(5), 673–680.

    Article  Google Scholar 

  • Paré G, Tate M, Johnstone D and Kitsiou S (2016) Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews. European Journal of Information Systems 25(6), 493–508.

    Article  Google Scholar 

  • Paré G, Trudel M-C, Jaana M and Kitsiou S (2015) Synthesizing information systems knowledge: A typology of literature reviews. Information and Management 52(2), 183–199.

    Article  Google Scholar 

  • Pathari V and Sonar R (2012) Identifying linkages between statements in information security policy, procedures and controls. Information Management and Computer Security 20(4), 264–280.

    Article  Google Scholar 

  • Peace AG, Galletta DF and Thong JYL (2003) Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems 20(1), 153–177.

    Article  Google Scholar 

  • Perrow C (1986) Complex Organizations. Random House, New York.

    Google Scholar 

  • Phelps DC, Gathegi JN, Workman M and Heo M (2012) Information system security: Self-efficacy and implementation effectiveness. Journal of Information System Security 8(1), 3–21.

    Google Scholar 

  • Posey C, Bennett RJ and Roberts TL (2011a) Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes. Computers and Security 30(6–7), 486–497.

    Article  Google Scholar 

  • Posey C, Bennett RJ, Roberts TL and Lowry PB (2011b) When computer monitoring back-fires: Privacy invasions and organizational injustice as precursors to computer abuse. Journal of Information System Security 7(1), 24–47.

    Google Scholar 

  • Posey C, Roberts TL and Lowry PB (2015) The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems 32(4), 179–214.

    Article  Google Scholar 

  • Posey C, Roberts TL, Lowry PB, Bennett RJ and Courtney JF (2013) Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly 37(4), 1189–1210.

    Article  Google Scholar 

  • Puhakainen P and Siponen M (2010) Improving employees’ compliance through information systems security training: An action research study. MIS Quarterly 34(4), 757–778.

    Article  Google Scholar 

  • Pwc (2016) The global state of information security survey 2016. http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey.html, accessed 30 January 2017.

  • Rees J, Bandyopadhyay S and Spafford EH (2003) PFIRES: A policy framework for information security. Communications of the ACM 46(7), 101–106.

    Article  Google Scholar 

  • Remus U, Wiener M, Mähring M, Saunders C and Cram WA (2015) Why do you control? The concept of control purpose and its implications for IS project control research. In Thirty Sixth International Conference on Information Systems pp 1–19, Fort Worth.

  • Renaud K and Goucher W (2012) Health service employees and information security policies: An uneasy partnership? Information Management and Computer Security 20(4), 296–311.

    Article  Google Scholar 

  • Rhee H-S, Kim C and Ryu YU (2009) Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers and Security 28(8), 816–826.

    Article  Google Scholar 

  • Roberts BW, Walton KE and Viechtbauer W (2006) Patterns of mean-level change in personality traits across the life course: A meta-analysis of longitudinal studies. Psychological Bulletin 132(1), 1–25.

    Article  Google Scholar 

  • Ross SJ (2015) Cybersecurity for a “simple” auditor. ISACA Journal 6(6), 1–2.

    Google Scholar 

  • Rowe F (2014) What literature review is not: Diversity, boundaries and recommendations. European Journal of Information Systems 23(3), 241–255.

    Article  Google Scholar 

  • Sabherwal R and Robey D (1995) Reconciling variance and process strategies for studying information systems development. Information Systems Research 6(4), 303–327.

    Article  Google Scholar 

  • Safa NS, Von Solms R and Furnell S (2016) Information security policy compliance model in organizations. Computers and Security 56(1), 70–82.

    Article  Google Scholar 

  • Salterio SE (2014) We don’t replicate accounting research—or do we? Contemporary Accounting Research 31(4), 1134–1142.

    Article  Google Scholar 

  • Santana M and Robey D (1995) Perceptions of control during systems development: Effects on job satisfaction of systems professionals. Computer Personnel 16(1), 20–34.

    Article  Google Scholar 

  • Schmerken I (2015) Morgan Stanley data theft exposes insider threat & need for more restrictions. http://www.wallstreetandtech.com/security/morgan-stanley-data-theft-exposes-insider-threat-and-need-for-more-restrictions, accessed 30 January 2015.

  • Schnedler W and Vadovic R (2011) Legitimacy of control. Journal of Economics and Management Strategy 20(4), 985–1009.

    Article  Google Scholar 

  • Schneider FB (2000) Enforceable security policies. ACM Transactions on Information and System Security 3(1), 30–50.

    Article  Google Scholar 

  • Schryen G (2015) Writing qualitative IS literature reviews—guidelines for synthesis, interpretation, and guidance of research. Communications of the Association for Information Systems 37(12), 286–325.

    Google Scholar 

  • Scott WR (1987) The adolescence of institutional theory. Administrative Science Quarterly 32(4), 493–511.

    Article  Google Scholar 

  • Sharma A (1997) Professional as agent: Knowledge asymmetry in agency exchange. Academy of Management Review 22(3), 758–798.

    Google Scholar 

  • Shephard MM and Mejias RJ (2016) Nontechnical deterrence effects of mild and severe internet use policy reminders in reducing employee internet abuse. International Journal of Human-Computer Interaction 32(7), 557–567.

    Article  Google Scholar 

  • Shirtz D and Elovici Y (2011) Optimizing investment decisions in selecting information security remedies. Information Management and Computer Security 19(2), 95–112.

    Article  Google Scholar 

  • Shropshire J, Warkentin M and Sharma S (2015) Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Computers and Security 49, 177–191.

  • Silva L, Hsu C, Backhouse J and Mcdonnell A (2016) Resistance and power in a security certification scheme: The case of c:Cure. Decision Support Systems 92, 68–78.

  • Siponen M (2000) A conceptual foundation for organizational information security awareness. Information Management and Computer Security 8(1), 31–41.

    Article  Google Scholar 

  • Siponen M (2006) Information security standards focus on the existence of process, not its content. Communications of the ACM 49(8), 97–100.

    Article  Google Scholar 

  • Siponen M and Iivari J (2006) Six design theories for IS security policies and guidelines. Journal of the Association for Information Systems 7(7), 445–472.

    Google Scholar 

  • Siponen M, Mahmood MA and Pahnila S (2009) Are employees putting your company at risk by not following information security policies? Communications of the ACM 52(12), 145–147.

    Article  Google Scholar 

  • Siponen M, Mahmood MA and Pahnila S (2014) Employees’ adherence to information security policies: An exploratory field study. Information and Management 51(2), 217–224.

    Article  Google Scholar 

  • Siponen M and Oinas-Kukkonen H (2007) A review of information security issues and respective research contributions. The DATA BASE for Advances in Information Systems 38(1), 60–80.

    Article  Google Scholar 

  • Siponen M, Pahnila S and Mahmood MA (2010) Compliance with information security policies: An empirical investigation. Computer 43(2), 64–71.

    Article  Google Scholar 

  • Siponen M and Vance A (2010) Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34(3), 487–502.

    Article  Google Scholar 

  • Siponen M and Vance A (2014) Guidelines for improving the contextual relevance of field surveys: The case of information security policy violations. European Journal of Information Systems 23(3), 289–305.

    Article  Google Scholar 

  • Siponen M and Willison R (2009) Information security management standards: Problems and solutions. Information and Management 46(5), 267–270.

    Article  Google Scholar 

  • Siponen M, Willison R and Baskerville R (2008) Power and practice in information systems security research. In International Conference on Information Systems pp 1–13, Association for Information Systems, Paris.

    Google Scholar 

  • Smith S, Winchester D, Bunker D and Jamieson R (2010) Circuits of power: A study of mandated compliance to an information systems security “de jure” standard in a government organization. MIS Quarterly 34(3), 463–486.

    Article  Google Scholar 

  • Sommestad T, Hallberg J, Lundholm K and Bengtsson J (2014) Variables influencing information security policy compliance: A systematic review of quantitative studies. Information Management and Computer Security 22(1), 42–75.

    Article  Google Scholar 

  • Sommestad T, Karlzén H and Hallberg J (2015) The sufficiency of the theory of planned behavior for explaining information security policy compliance. Information and Computer Security 23(2), 200–217.

    Article  Google Scholar 

  • Son J-Y (2011) Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Information and Management 48(7), 296–302.

    Article  Google Scholar 

  • Son J-Y and Park J (2016) Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns. International Journal of Information Management 36(3), 309–321.

    Article  Google Scholar 

  • Soomro ZA, Shah MH and Ahmed J (2016) Information security management needs more holistic approach: A literature review. International Journal of Information Management 36(2), 215–225.

    Article  Google Scholar 

  • Spears JL and Barki H (2010) User participation in information systems security risk management. MIS Quarterly 34(3), 503–522.

    Article  Google Scholar 

  • Stahl BC, Doherty NF and Shaw M (2012) Information security policies in the uk healthcare sector: A critical evaluation. Information Systems Journal 22(1), 77–94.

    Article  Google Scholar 

  • Stanton J, Stam K, Mastrangelo P and Jolton J (2005) Analysis of end user security behaviors. Computers and Security 24(2), 124–133.

    Article  Google Scholar 

  • Straub DW (1990) Effective IS security: An empirical study. Information Systems Research 1(3), 255–276.

    Article  Google Scholar 

  • Straub DW and Nance WD (1990) Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly 14(1), 45–62.

    Article  Google Scholar 

  • Straub DW and Welke RJ (1998) Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22(4), 441–469.

    Article  Google Scholar 

  • Susanto H, Almunawar MN and Tuan YC (2011) Information security management system standards: A comparative study of the big five. International Journal of Electrical and Computer Sciences 11(5), 23–29.

    Google Scholar 

  • Tang M, Li M and Zhang T (2016) The impacts of organizational culture on information security culture: A case study. Information Technology and Management 17(2), 179–186.

    Article  Google Scholar 

  • Tannenbaum AS (1962) Control in organizations: Individual adjustment and organizational performance. Administrative Science Quarterly 7(2), 236–257.

    Article  Google Scholar 

  • Teh P-L, Ahmed PK and D’arcy J (2015) What drives information security policy violations among banking employees? Insights from neutralization and social exchange theory. Journal of Global Information Management 23(1), 44–64.

    Article  Google Scholar 

  • Thomson K-L (2010) Information security conscience: A precondition to an information security culture? Journal of Information System Security 6(4), 3–19.

    Google Scholar 

  • Thong JYL and Yap CS (1998) Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems 15(1), 213–237.

    Article  Google Scholar 

  • Tiwana A and Keil M (2009) Control in internal and outsourced software projects. Journal of Management Information Systems 26(3), 9–44.

    Article  Google Scholar 

  • Tsang EWK and Kwan K-M (1999) Replication and theory development in organizational science: A critical realist perspective. Academy of Management Review 24(4), 759–780.

    Google Scholar 

  • Tsohou A, Karyda M and Kokolakis S (2015a) Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Computers and Security 52, 128–141.

  • Tsohou A, Karyda M, Kokolakis S and Kiountouzis E (2010) Aligning security awareness with information system security management. Journal of Information System Security 6(1), 36–54.

    Google Scholar 

  • Tsohou A, Karyda M, Kokolakis S and Kiountouzis E (2015b) Managing the introduction of information security awareness programmes in organizations. European Journal of Information Systems 24(1), 38–58.

    Article  Google Scholar 

  • Twenge JM, Konrath S, Foster JD, Campbell WK and Bushman BJ (2008) Egos inflating over time: A cross-temporal meta-analysis of the narcissistic personality inventory. Journal of Personality and Social Psychology 76(4), 875–902.

    Google Scholar 

  • Unal D and Caglayan MU (2013) A formal role-based access control model for security policies in multi-domain mobile networks. Computer Networks 57(1), 330–350.

    Article  Google Scholar 

  • Uzunov AV, Fernandez EB and Falkner K (2015) Security solution frames and security patterns for authorization in distributed, collaborative systems. Computers and Security 55(1), 193–234.

    Article  Google Scholar 

  • Vaast E (2007) Danger is in the eye of the beholders: Social representations of information systems security in healthcare. Journal of Strategic Information Systems 16(2), 130–152.

    Article  Google Scholar 

  • Van Iddekinge CH, Ferris GR and Heffner TS (2009) Test of a multistage model of distal and proximal antecedents of leader performance. Personnel Psychology 62(3), 463–495.

    Article  Google Scholar 

  • Vance A, Anderson BB, Kirwan CB and Eargle D (2014) Using measures of risk perception to predict information security behavior: Insights from electroencephalography (EEG). Journal of the Association for Information Systems 15(10), 679–722.

    Google Scholar 

  • Vance A, Lowry PB and Eggett D (2013) Using accountability to reduce access policy violations in information systems. Journal of Management Information Systems 29(4), 263–289.

    Article  Google Scholar 

  • Vance A, Lowry PB and Eggett D (2015) Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Quarterly 39(2), 345–366.

    Article  Google Scholar 

  • Vance A and Siponen M (2012) IS security policy violations: A rational choice perspective. Journal of Organizational and End User Computing 24(1), 21–41.

    Article  Google Scholar 

  • Vance A, Siponen M and Pahnila S (2012) Motivating IS security compliance: Insights from habit and protection motivation theory. Information and Management 49(3–4), 190–198.

    Article  Google Scholar 

  • Verizon (2016) 2016 data breach investigations report. http://www.verizonenterprise.com/DBIR/2015/, accessed 25 February 2017.

  • Vom Brocke J, Simons A, Riemer K, Niehaves B and Plattfaut R (2015) Standing on the shoulders of giants: Challenges and recommendations of literature search in information systems research. Communications of the Association for Information Systems 37(9), 205–224.

    Google Scholar 

  • Von Dran GM, Guynes CS and Prybutok VR (1996) The information infrastructure: Policy and security considerations. Computers and Society 26(1), 13–15.

    Article  Google Scholar 

  • Von Solms R (1999) Information security management: Why standards are important. Information Management and Computer Security 7(1), 50–57.

    Article  Google Scholar 

  • Vroom C and Von Solms R (2004) Towards information security behavioural compliance. Computers and Security 23(3), 191–198.

    Article  Google Scholar 

  • Wall DS (2013) Enemies within: Redefining the insider threat in organizational security policy. Security Journal 26(2), 107–124.

    Article  Google Scholar 

  • Wall JD, Lowry PB and Barlow JB (2016) Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess. Journal of the Association for Information Systems 17(1), 39–76.

    Google Scholar 

  • Wall JD, Palvia P and Lowry PB (2013) Control-related motivations and information security policy compliance: The role of autonomy and efficacy. Journal of Information Privacy and Security 9(4), 52–79.

    Article  Google Scholar 

  • Wall JD, Stahl BC and Salam AF (2015) Critical discourse analysis as a review methodology: An empirical example. Communications of the Association for Information Systems 37(1), 257–285.

    Google Scholar 

  • Warkentin M, Johnston AC and Shropshire J (2011) The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems 20(3), 267–284.

    Article  Google Scholar 

  • Warkentin M, Johnston AC, Shropshire J and Barnett WD (2016a) Continuance of protective security behavior: A longitudinal study. Decision Support Systems 92, 25–35.

  • Warkentin M, Walden E, Johnston AC and Straub DW (2016b) Neural correlates of protection motivation for secure IT behaviors: An fMRI examination. Journal of the Association for Information Systems 17(3), 194–215.

    Google Scholar 

  • Warman AR (1992) Organizational computer security policy: The reality. European Journal of Information Systems 1(5), 305–310.

    Article  Google Scholar 

  • Webster J and Watson RT (2002) Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly 26(2), xiii–xxiii.

  • Weldon D (2015) Are your biggest security threats on the inside? http://www.cio.com/article/2985790/security/are-your-biggest-security-threats-on-the-inside.html, accessed 1 December 2015.

  • Whitman ME (2008) Security policy: From design to maintenance. In Information security: Policy, processes, and practices (Straub DW, Goodman SE and Baskerville R, Eds), pp 123–151, M. E. Sharpe, New York.

    Google Scholar 

  • Whitman ME, Townsend AM and Aalberts RJ (2001) Information systems security and the need for policy. In Information security management: Global challenges in the new millennium (DHILLON G, Ed), pp 10–20, IGI Global, Hershey PA.

    Google Scholar 

  • Wiant TL (2005) Information security policy’s impact on reporting security incidents. Computers and Security 24(6), 448–459.

    Article  Google Scholar 

  • Wiener M, Mähring M, Remus U and Saunders C (2016) Control configuration and control enactment in information systems projects: Review and expanded theoretical framework. MIS Quarterly 40(3), 741–774.

    Article  Google Scholar 

  • Willison R (2006) Understanding the perpetration of employee computer crime in the organisational context. Information and Organization 16(4), 304–324.

    Article  Google Scholar 

  • Willison R and Backhouse J (2006) Opportunities for computer abuse: Considering systems risk from the offender’s perspective. European Journal of Information Systems 15(4), 403–414.

    Article  Google Scholar 

  • Willison R and Warkentin M (2013) Beyond deterrence: An expanded view of employee computer abuse. MIS Quarterly 37(1), 1–20.

    Article  Google Scholar 

  • Wood CC (1982) Policies for deterring computer abuse. Computers and Security 1(2), 139–145.

    Article  Google Scholar 

  • Workman M (2009) A field study of corporate employee monitoring: Attitudes, absenteeism, and the moderating influences of procedural justice perceptions. Information and Organization 19(4), 218–232.

    Article  Google Scholar 

  • Workman M, Bommer WH and Straub DW (2008) Security lapses and the omission of information securitymeasures: A threat control model and empirical test. Computers in Human Behavior 24(6), 2799–2816.

    Article  Google Scholar 

  • Workman M and Gathegi J (2007) Punishment and ethics deterrents: A study of insider security contravention. Journal of the American Society for Information Science and Technology 58(2), 212–222.

    Article  Google Scholar 

  • Xue Y, Liang H and Wu L (2011) Punishment, justice, and compliance in mandatory IT settings. Information Systems Research 22(2), 400–414.

    Article  Google Scholar 

  • Yazdanmehr A and Wang J (2016) Employees’ information security policy compliance: A norm activation perspective. Decision Support Systems 92, 36–46.

  • Zafar H and Clark JG (2009) Current state of information security research in IS. Communications of the AIS 24(34), 557–596.

    Google Scholar 

  • Zhang J, Reithel BJ and Li H (2009) Impact of perceived technical protection on security behaviors. Information Management and Computer Security 17(4), 330–340.

    Article  Google Scholar 

  • Zhang X, Parisi-Presicce F, Sandhu R and Park J (2005) Formal model and policy specification of usage control. ACM Transactions on Information and System Security 8(4), 351–387.

    Article  Google Scholar 

  • Zsidisin GA and Ellram LM (2003) An agency theory investigation of supply risk management. Journal of Supply Chain Management 39(3), 15–27.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. Alec Cram.

Additional information

Special Issue Editors: Paul Benjamin Lowry, Tamara Dinev, Robert Willison

Appendices

Appendix A: Security policy research literature reviews

The following is not an exhaustive list of IS security research literature reviews, as there are additional reviews that are only tangentially related to security policy research and/or appear in lower-tier journals and conference proceedings.

Article

Coverage

Description/key findings

How our review differs in scope*

Crossler et al (2013)

Overview of behavioral IS security literature; not a systematic review paper

Using the extant literature as a base, proposed the following topics for future behavioral IS security research: separating insider deviant behavior from insider misbehavior; unmasking the mystery of the hacker world; improving information security compliance; cross-cultural information security research

We review the broader body of security policy literature

D’Arcy and Herath (2011)

17 empirical studies in the IS literature that used deterrence (sanction) constructs, published through 2010 (approximately); specific time period not provided

Reviewed empirical studies that used deterrence theory in the IS literature; in an attempt to explain the contradictory findings in this literature, identified contingency variables, and methodological and theoretical issues specific to the application of deterrence theory in the IS context

We review the broader body of security policy literature

Dhillon and Backhouse (2001)

IS security literature through 2000 (approximately); specific number of articles and time period not provided

Classified IS security literature into Burrell and Morgan’s sociological paradigms (functionalist, interpretive, radical humanist, radical structuralist); one of the earliest papers to identify the preponderance of purely technical IS security research and called for a socioorganizational perspective

We review the more specific body of security policy literature

Guo (2013)

Not a systematic review paper; literature on employees’ security-related behavior; specific number of articles and time period not provided

Provided a classification/taxonomy of employees’ security-related behavior, based on the extant literature

We review the broader body of security policy literature

Karlsson et al (2015)

72 information security culture research articles published between 2000 and 2013

Classified the papers in terms of theories, research methods, and research topics

We review the security policy literature, which is distinct from security culture research

Lebek et al (2013); Lebek et al (2014)

113 articles on employees’ information security awareness and behavior published between 2000 and mid 2012 (both the 2013 and 2014 publications cover the same scope)

Classified 54 different theories used in behavioral IS security studies; based on the results, provided a taxonomy of antecedents of information security behavior

We review the broader body of security policy literature

Padayachee (2012)

Not a systematic review paper; overview of selected literature on employees’ security policy compliance; specific number of articles and time period not provided

Provided a taxonomy of factors that influence employees’ security policy compliance, which was derived from the literature and grounded in self-determination theory

We review the broader body of security policy literature

Siponen and Oinas-Kukkonen (2007)

IS security literature through 2000; specific number of articles not provided

Classified the papers based on research approaches, reference disciplines, and security issues (access to information systems, secure communication, security management, secure information systems development)

We review the more specific body of security policy literature

Siponen & Vance (2014)

19 empirical, survey studies of employees’ security policy compliance, published between 1990 and 2011

Provided methodological guidelines for survey studies of security policy compliance behavior in organizations; the guidelines were applied to the reviewed articles, and no study met more than three of the five proposed guidelines.

We review the broader body of security policy literature

Siponen et al (2008)

1280 IS security research articles published between 1990 and 2004

Classified the papers in terms of theories, research methods, and research topics

We review the more specific body of security policy literature

Sommestad et al (2014)

29 empirical studies of employees’ security policy compliance published through 2012 (approximately); specific time period not provided

Meta-analyzed the literature on employees’ security policy compliance; showed the relative strength of the various predictor variables used in the literature (60 total predictor variables)

We review the broader body of security policy literature

Soomro et al (2016)

67 articles on management role in information security published between 2004 and September 2014

Classified the papers into the following categories: information security and management; information security policy awareness and training; integration of technical and managerial activities for information security management; human aspects of information security management; information security as a business issue

We review the more specific body of security policy literature

Wall et al (2015)

24 empirical studies of employees’ security-related behavior published between 2002 and 2012

Evaluated the philosophical underpinnings (using critical review methods) of empirical studies of employees’ security-related behavior

We review the broader body of security policy literature

Willison and Warkentin (2013)

Overview of selected IS and general literature on neutralization, deterrence and expressive motivations, and organizational justice; specific number of articles and time period not provided; not a systematic review paper

Proposed the following topics for future empirical investigations of employee computer abuse: techniques of neutralization (rationalizations), expressive/instrumental criminal motivations, disgruntlement as a result of perceptions of organizational justice

We review the broader body of security policy literature

Zafar & Clark (2009)

137 IS security research articles published through 2007; start date not provided

Classified the papers according to themes established by the IBM Information Security Capability Reference Model (e.g., Governance, Identity and Access Management, Personnel Security)

We review the more specific body of security policy literature

  1. * Our review also differs from each of these based on the time frame (ours is through the first half of 2017), and the identification of linkages among the constructs in the literature (as opposed to primarily a classification of articles based on research topic, theory, method, etc.).

Appendix B: Articles included in review (sorted by author)

The issue of which articles constitute security policy research is not entirely straightforward, particularly when it comes to the vast literature on employees’ security policy compliance. Within this subset of the security policy literature, there exist many different conceptualizations of compliance behavior (Chu et al, 2015; Guo, 2013), and not all behaviors contain an explicit security policy labeling. We follow the criteria of past reviews (Siponen & Vance, 2014; Sommestad et al, 2014) and include policy-related behaviors in organizational contexts, such as computer abuse and IS misuse, within our conceptualization of security policy compliance. Including these behaviors is based on the notion that they mainly involve the unauthorized use of information and technology resources within organizations, and, therefore, constitute security policy violations (Chu et al, 2015).

A similar issue exists with respect to protection motivation theory (PMT)-based studies on how to achieve secure behavior (e.g., Boss et al, 2009, 2015; Johnston & Warkentin, 2010a; Posey et al, 2015). Within this work, some papers explicitly describe secure behaviors in response to security policies (e.g., using anti-spyware, backing up data, changing passwords), whereas others are vague on this issue, or are specific to the personal/home usage context. Again, following past reviews of the security compliance literature (Siponen & Vance, 2014; Sommestad et al, 2014), we include only those PMT-based studies that involve secure behavior in organizational contexts. Adhering to these criteria means that a study meets at least one of the following conditions: (1) a description of secure behavior in which the user is interacting with an organizational information system, (2) a description of the direct relevance of the secure behavior to the organizational context, or (3) the use of organizational respondents. PMT-based studies where the population is personal/home computer users or the context is otherwise not work-related are excluded, because in such cases individuals are not subject to security policies and must acquire information about security threats and tools on their own (Anderson & Agarwal, 2010; Chen and Zahedi, 2016). Appendix D further details our exclusion criteria, as it pertains to a specific list of excluded articles.

In making the preceding points, we emphasize that the PMT-based studies of how to achieve secure behavior often use similar constructs, regardless of whether the context is organizational or personal/home usage. Likewise, studies of employees’ security compliance use many similar theoretical bases and constructs across the variety of behaviors being investigated (e.g., security policy compliance/non-compliance, computer abuse, IS misuse, etc.). Consequently, we have captured the key constructs and themes within these subsets of the security policy literature, even if a particular study may have been excluded based on our criteria.

Regarding the overall security policy literature, we do not claim to have captured every (peer-reviewed) published article for this review, but we do have a relatively complete consensus of the literature, to the point where the constructs and interrelationships in our research framework are supported and no new concepts emerged from the literature. In this manner, we followed Rowe’s (2014) guidance that reviews for understanding should strive for strong coverage of the domain rather than absolute completeness.

Article

Journal

Empirical/Conceptual

Methodology

Al-Mukahal & Alshare (2015)

Information and Computer Security

Empirical

Survey

Aurigemma & Leonard (2015)

Journal of Information System Security

Empirical

Survey

Barlow et al (2013)

Computers and Security

Empirical

Survey

Baskerville et al (2014)

Information Technology and People

Conceptual

Boss et al (2009)

European Journal of Information Systems

Empirical

Survey

Bulgurcu et al (2010)

MIS Quarterly

Empirical

Survey

Chan et al (2005)

Journal of Information Privacy and Security

Empirical

Survey

Chen et al (2012)

Journal of Management Information Systems

Empirical

Experiment

Chen et al (2015)

The Journal of Computer Information Systems

Empirical

Survey

Cheng et al (2013)

Computers and Security

Empirical

Survey

Chu et al (2016)

Journal of Business Ethics

Empirical

Survey

Crossler et al (2014)

Journal of Information Systems

Empirical

Survey

D’Arcy and Hovav (2007)

Communications of the ACM

Empirical

Survey

D’Arcy & Devaraj (2012)

Decision Sciences

Empirical

Survey

D’Arcy and Greene (2014)

Information Management and Computer Security

Empirical

Survey

D’Arcy et al (2009)

Information Systems Research

Empirical

Survey

D’Arcy et al (2014)

Journal of Management Information Systems

Empirical

Survey

Dinev & Hu (2007)

Journal of the Association for Information Systems

Empirical

Survey

Dinev et al (2009)

Information Systems Journal

Empirical

Survey

Doherty & Fulford (2005)

Information Resources Management Journal

Empirical

Survey

Doherty & Fulford (2006)

Computers & Security

Conceptual

Doherty et al (2009)

International Journal of Information Management

Empirical

Archival

Flowerday & Tuyikeze (2016)

Computers and Security

Empirical

Survey

Foth (2016)

European Journal of Information Systems

Empirical

Survey

Fulford & Doherty (2003)

Information Management and Computer Security

Empirical

Survey

Gaunt (1998)

International Journal of Medical Informatics

Empirical

Observation, Survey

Goel and Chengalur-Smith (2010)

Journal of Strategic Information Systems

Empirical

Survey

Goo et al (2014)

IEEE Transactions on Professional Communication

Empirical

Survey

Gritzalis (1997)

Computers and Security

Conceptual

Guo & Yuan (2012)

Information and Management

Empirical

Survey

Guo et al (2011)

Journal of Management Information Systems

Empirical

Survey

Han et al (2017)

Computers and Security

Empirical

Survey

Harrington (1996)

MIS Quarterly

Empirical

Survey

Hedström et al (2011)

Journal of Strategic Information Systems

Empirical

Case studies

Herath & Rao (2009a)

Decision Support Systems

Empirical

Survey

Herath & Rao (2009b)

European Journal of Information Systems

Empirical

Survey

Höne and Eloff (2002a)

Computers and Security

Conceptual

Höne and Eloff (2002b)

Network Security

Conceptual

Hong et al (2006)

Information Management and Computer Security

Empirical

Survey

Hovav & D’Arcy (2012)

Information and Management

Empirical

Survey

Hsu et al (2015)

Information Systems Research

Empirical

Survey

Hu et al (2011)

Communications of the ACM

Empirical

Scenario, Survey

Hu et al (2012)

Decision Sciences

Empirical

Survey

Hu et al (2015)

Journal of Management Information Systems

Empirical

Experiment

Hwang et al (2017)

Online Information Review

Empirical

Survey

Ifinedo (2012)

Computers and Security

Empirical

Survey

Ifinedo (2014)

Information and Management

Empirical

Survey

Ifinedo (2016)

Information Systems Management

Empirical

Survey

Johnston & Warkentin (2010a)

MIS Quarterly

Empirical

Experiment

Johnston & Warkentin (2010b)

Journal of Organizational and End User Computing

Empirical

Experiment

Johnston et al (2013)

Journal of Organizational and End User Computing

Empirical

Survey

Johnston et al (2015)

MIS Quarterly

Empirical

Experiment, Interviews

Johnston et al (2016)

European Journal of Information Systems

Empirical

Survey

Kadam (2007)

Information Systems Security

Conceptual

Karyda et al (2005)

Computers & Security

Empirical

Case studies

Kim et al (2016)

Information & Management

Empirical

Survey

Knapp et al (2006)

Information Management and Computer Security

Empirical

Interviews, Survey

Knapp et al (2009)

Computers & Security

Empirical

Survey, Content Analysis

Knapp & Ferrante (2012)

Journal of Management Policy and Practice

Empirical

Survey

Lee and Larson (2009)

European Journal of Information Systems

Empirical

Survey

Lee and Lee (2002)

Information Management and Computer Security

Conceptual

Lee et al (2004)

Information and Management

Empirical

Survey

Lee et al (2016)

Computers and Security

Empirical

Survey

Li et al (2010)

Decision Support Systems

Empirical

Survey

Li et al (2014)

Information Systems Journal

Empirical

Survey

Liao et al (2009)

Journal of Computer Information Systems

Empirical

Survey

Liang et al (2013)

Information Systems Research

Empirical

Survey

Lowry & Moody (2015)

Information Systems Journal

Empirical

Scenario, Survey

Lowry et al (2015)

Information Systems Journal

Empirical

Survey

Moquin & Wakefield (2016)

Journal of Computer Information Systems

Empirical

Survey

Myyry et al (2009)

European Journal of Information Systems

Empirical

Survey

Ng et al (2009)

Decision Support Systems

Empirical

Survey

Padayachee (2012)

Computers & Security

Conceptual

Pathari & Sonar (2012)

Information Management and Computer Security

Conceptual

Modeling

Posey et al (2011a)

Computers and Security

Empirical

Survey

Posey et al (2015)

Journal of Management Information Systems

Empirical

Survey

Puhakainen & Siponen (2010)

MIS Quarterly

Empirical

Survey, Interviews

Rees et al (2003)

Communications of the ACM

Conceptual

Renaud & Goucher (2012)

Information Management and Computer Security

Empirical

Interviews

Safa et al (2016)

Computers & Security

Empirical

Survey

Shephard & Mejias (2016)

International Journal of HumanComputer Interaction

Empirical

Experiment

Shropshire et al (2015)

Computers and Security

Empirical

Survey

Siponen (2000)

Information Management and Computer Security

Conceptual

Siponen (2006)

Communications of the ACM

Conceptual

Siponen & Iivari (2006)

Journal of the Association for Information Systems

Conceptual

Siponen & Vance (2010)

MIS Quarterly

Empirical

Scenario, Survey

Siponen & Willison (2009)

Information and Management

Empirical

Archival

Siponen et al (2009)

Communications of the ACM

Empirical

Survey

Siponen et al (2010)

Computer

Empirical

Survey

Siponen et al (2014)

Information and Management

Empirical

Survey

Sommestad et al (2015)

Information and Computer Security

Empirical

Survey

Son (2011)

Information and Management

Empirical

Survey

Park & Son (2016)

International Journal of Information Management

Empirical

Survey

Spears & Barki (2010)

MIS Quarterly

Empirical

Interviews, Survey

Stahl et al (2012)

Information Systems Journal

Empirical

Archival

Straub (1990)

Information Systems Research

Empirical

Survey

Teh et al (2015)

Journal of Global Information Management

Empirical

Survey

Tsohou et al (2015b)

European Journal of Information Systems

Empirical

Action, Case Study

Vaast (2007)

Journal of Strategic Information Systems

Empirical

Interviews

Vance & Siponen (2012)

Journal of Organizational and End User Computing

Empirical

Scenario, Survey

Vance et al (2012)

Information and Management

Empirical

Survey

Vance et al (2013)

Journal of Management Information Systems

Empirical

Scenario, Survey

Vance et al (2015)

MIS Quarterly

Empirical

Scenario, Survey

von Solms (1999)

Information Management and Computer Security

Conceptual

Wall (2013)

Security Journal

Empirical

Archival

Wall et al (2013)

Journal of Information Privacy and Security

Empirical

Survey

Warkentin et al (2011)

European Journal of Information Systems

Empirical

Survey

Warman (1992)

European Journal of Information Systems

Empirical

Survey, Interview

Wiant (2005)

Computers and Security

Empirical

Survey

Wood (1982)

Computers and Security

Conceptual

Workman et al (2008)

Computers in Human Behavior

Empirical

Archival, Survey

Xue et al (2011)

Information Systems Research

Empirical

Survey

Yazdanmehr & Wang (2016)

Decision Support Systems

Empirical

Survey

Zhang et al (2009)

Information Management and Computer Security

Empirical

Survey

Appendix C: Articles included in review (sorted by article frequency)

Journal

Number of articles included in review

Computers and Security

17

Information Management and Computer Security

10

European Journal of Information Systems

9

Information and Management

9

MIS Quarterly

8

Journal of Management Information Systems

6

Communications of the ACM

5

Information Systems Journal

5

Information Systems Research

5

Decision Support Systems

4

Journal of Computer Information Systems

3

Journal of Organizational and End User Computing

3

Journal of Strategic Information Systems

3

Decision Sciences

2

Information and Computer Security

2

International Journal of Information Management

2

Journal of Information Privacy and Security

2

Journal of the Association for Information Systems

2

Computer

1

Computers in Human Behavior

1

IEEE Transactions on Professional Communication

1

International Journal of HumanComputer Interaction

1

International Journal of Medical Informatics

1

Information Resources Management Journal

1

Information Systems Management

1

Information Systems Security

1

Information Technology and People

1

Journal of Business Ethics

1

Journal of Global Information Management

1

Journal of Information Systems

1

Journal of Information System Security

1

Journal of Management Policy and Practice

1

Network Security

1

Online Information Review

1

Security Journal

1

Appendix D: Articles excluded from the review

The following table lists articles that were excluded from our review, including details of our rationale. Obviously, this list is not exhaustive, but our aim is to provide transparency into our exclusion process, particularly with respect to the exclusion of certain well-known articles that appear in top-tier IS journals. We refer the reader back to the Methodology section, as well as Appendix B, for additional details on our inclusion/exclusion criteria.

Notes: the term “not security policy centric” is used to describe an article that we deemed as not directly addressing the design, implementation, compliance/non-compliance, or monitoring of security policies in organizations. Many such articles address information security issues or information security management in a general sense. The remaining descriptions of our rationale for exclusion are self-explanatory.

Article

Journal

Rationale for Exclusion

Albrechtsen (2007)

Computers and Security

Not security policy centric

Anderson & Agarwal (2010)

MIS Quarterly

Not security policy centric; personal/home usage context

Backhouse et al (2006)

MIS Quarterly

Oriented toward industry policy

Basin et al (2013)

ACM Transactions on Information and System Security

Oriented toward technical policy

Bauer and van Eeten (2009)

Telecommunications Policy

Not security policy centric

Bauer et al (2009)

ACM Transactions on Software Engineering and Methodology

Oriented toward technical policy

Boss et al (2015)

MIS Quarterly

Not security policy centric; personal/home usage context

Burns et al (2017)

Computers in Human Behavior

Not security policy centric

Chen and Zahedi (2016)

MIS Quarterly

Not security policy centric; personal/home usage context

Crossler and Bélanger (2009)

Journal of Information System Security

Not security policy centric

Culnan and Williams (2009)

MIS Quarterly

Not security policy centric; issues and opinion paper

Cuppens et al (2013)

Journal of Computer Security

Oriented toward technical policy

David (2002)

Computers and Security

Issues and opinion paper

Dhillon and Backhouse (2000)

Communications of the ACM

Not security policy centric

Di Modica and Tomarchio (2016)

  

Foley and Fitzgerald (2011)

Journal of Computer Security

Oriented toward technical policy

Herath et al (2014)

Information Systems Journal

Not security policy centric; personal/home usage context

Hicks et al (2010)

ACM Transactions on Information and System Security

Oriented toward technical policy

Horcas et al (2016)

Computers and Security

Oriented toward technical policy

Jajodia et al (2001)

ACM Transactions on Database Systems

Oriented toward technical policy

Kankanhalli et al (2003)

International Journal of Information Management

Not security policy centric

Karjalainen and Siponen (2011)

Journal of the Association for Information Systems

Not security policy centric

Khoury and Tawbi (2012)

ACM Transactions on Information and System Security

Oriented toward technical policy

Li & Wang (2008)

Journal of the ACM

Not security policy centric

Liang & Xue (2009)

MIS Quarterly

Not security policy centric; personal/home usage context

Liang & Xue (2010)

Journal of the Association for Information Systems

Not security policy centric; personal/home usage context

Liu (2015)

European Journal of Information Systems

Not security policy centric

Liu et al (2016)

Information Sciences

Oriented toward technical policy

Lowry et al (2014)

Journal of Business Ethics

Not security policy centric

McDaniel and Prakash (2006)

ACM Transactions on Information and System Security

Oriented toward technical policy

Mehra (2010)

The American Journal of Comparative Law

Oriented toward public policy

Montanari et al (2013)

Computers & Security

Oriented toward technical policy

Muthaiyah and Kerschberg (2007)

Information Systems Frontiers

Oriented toward technical policy

Osenga (2013)

Journal of Information Policy

Oriented toward public policy

Phelps et al (2012)

Journal of Information System Security

Not security policy centric

Posey et al (2011b)

Journal of Information System Security

Not security policy centric

Posey et al (2013)

MIS Quarterly

Not security policy centric; primarily a methodological article; taxonomy of security-related behaviors

Rhee et al (2009)

Computers & Security

Not security policy centric; personal/home usage context

Schneider (2000)

ACM Transactions on Information and System Security

Oriented toward technical policy

Shirtz and Elovici (2011)

Information Management and Computer Security

Not security policy centric

Silva et al (2016)

Decision Support Systems

Oriented toward industry policy

Smith et al (2010)

MIS Quarterly

Oriented toward industry policy

Stanton et al (2005)

Computers and Security

Not security policy centric; taxonomy of security-related behaviors

Straub and Nance (1990)

MIS Quarterly

Not security policy centric

Straub & Welke (1998)

MIS Quarterly

Not security policy centric

Tang et al (2016)

Information Technology and Management

Not security policy centric

Thomson (2010)

Journal of Information System Security

Not security policy centric

Tsohou et al (2010)

Journal of Information System Security

Not security policy centric

Tsohou et al (2015a)

Computers & Security

Not security policy centric

Unal & Caglayan (2013)

Computer Networks

Oriented toward technical policy

Uzunov et al (2015)

Computers and Security

Oriented toward technical policy

Vance et al (2014)

Journal of the Association for Information Systems

Not security policy centric; personal/home usage context

Von Dran et al (1996)

Computers and Security

Issues and opinion paper

Vroom and von Solms (2004)

Computers and Security

Not security policy centric

Wall et al (2016)

Journal of the Association for Information Systems

Oriented toward public policy

Warkentin et al (2016b)

Journal of the Association for Information Systems

Not security policy centric; personal/home usage context

Warkentin et al (2016a)

Decision Support Systems

Not security policy centric; personal/home usage context.

Willison (2006)

Information and Organization

Not security policy centric

Willison and Backhouse (2006)

European Journal of Information Systems

Not security policy centric

Workman and Gathegi (2007)

Journal of the American Society for Information Science and Technology

Not security policy centric; personal/home usage context

Zhang et al (2005)

ACM Transactions on Information and System Security

Oriented toward technical policy

Appendix E: Research framework constructs, definitions, and supporting publications

Construct

Definition

Examples

Sample Publications

Security standards, guidelines and regulations

The formal documents and opinions on security policy recommendations that are published by external bodies, groups, or associations

ISO 27001/02, COBIT, Health Insurance Portability and Accountability Act (HIPPA), Information Technology Infrastructure Library (ITIL), and the Payment Card Industry Data Security Standard (PCI DSS)

Knapp et al (2009), Siponen (2006); von Solms (1999)

Desired policy format and structure

The aims and objectives of an organization’s security policies, in terms of length, clarity, and level of detail

Management endeavors to design security policies that are concise and easy to understand

Goel and Chengalur-Smith (2010), Pathari & Sonar (2012)

Internal and external risk management considerations

The internal and external factors that pose information security risks to an organization

Organization type, size, IT infrastructure, business objectives, economic environment, and internal/external threats

Hong et al (2006), Karyda et al (2005), Knapp et al (2009), Warman (1992), Wall (2013)

Security policy design and implementation

The actual design characteristics of the completed security policy and the manner in which the policy is implemented at the organization

Creating an internet use policy by defining the purpose, scope, roles/responsibilities, and expected/prohibited employee behaviors

Karyda et al (2005), Knapp et al (2009), Wall (2013)

Information security culture, awareness, and support

Security culture consists of the shared assumptions, values, and beliefs help by a group of employees (Karlsson et al, 2015; Knapp et al, 2006). Security awareness refers to the values and attitudes that individual employees hold in regard to secure information practices (Tsohou et al, 2015). Managerial support for information security initiatives represents the financial backing, sponsorship, encouragement, and leadership that management put forth for security initiatives

Management is strongly committed to delivering the funds necessary to enhance employee awareness of security policies

Chen et al (2015), Johnston et al (2013), Karyda et al (2005)

Socioemotional consequences for employees

The interaction between the existence of a security policy and an employee’s social and emotional well-being

An employee feels an increased sense of stress in needing to comply with a new anti-malware policy at their organization

Renaud & Goucher (2012), Vaast (2007)

Personality and dispositional traits

The inherent, individual characteristics of employees, including behavioral, cognitive, and ethical norms

An employee believes that it is their moral responsibility to comply with security policies laid out by the organization

Ifinedo (2014), Myyry et al (2009), Vance & Siponen (2012)

Security policy legitimacy, fairness and justice

The perception of an individual that a security policy is desirable, appropriate, and reasonable

An employee considers a new password policy at their organization as an unfair burden on them

Hu et al (2012), Siponen & Iivari (2006), Son (2011)

Compliance with security policy

The extent to which employees intend to comply or actually comply with a security policy

Despite a policy stating that data backups should be completed every night, an employee ignores the guideline and only backs up their data on a weekly basis.

Bulgurcu et al (2010), Herath & Rao (2009a; b)

Organizational security objectives

The benefits that the implementation of security policies intend to achieve

By implementing a data protection policy, an organization hopes to reduce the number of incidents of personal information being accidentally released.

Hsu et al 2015; Knapp & Ferrante (2012), Spears & Barki (2010), Wiant (2005)

Appendix F: Article coding results by relationship

The papers highlighted in the R1–R5 columns below correspond to the findings presented in the Results section. The items listed in the “Main Theoretical/Conceptual Linkages” column represent theories and conceptual models that were referenced in each of the listed papers. The data presented here varies in magnitude and scope, depending on the theoretical orientation of each paper. In some cases, a theory or model was used to construct or extend a research model; in other cases, a broader theory or concept simply informed the direction of the research.

Paper

R1

R2

R3

R4

R5

Main Theoretical/Conceptual Linkages

Al-Mukahal & Alshare (2015)

  

x

  

Deterrence theory, neutralization theory, theory of planned behavior

Aurigemma & Leonard (2015)

  

x

  

Affective organizational commitment, theory of planned behavior, rational choice theory

Barlow et al (2013)

  

x

  

Theory of neutralization techniques

Baskerville et al (2014)

  

x

  

Emote opportunity model of computer abuse

Boss et al (2009)

 

x

x

  

Social influence theory, organismic integration theory, agency theory, control theory

Bulgurcu et al (2010)

  

x

  

Theory of planned behavior, rational choice theory, deterrence theory

Chan et al (2005)

  

x

  

Not applicable or none noted

Chen et al (2012)

  

x

  

Compliance theory, general deterrence theory

Chen et al (2015)

 

x

   

Organizational culture theory, security culture framework

Cheng et al (2013)

  

x

  

General deterrence theory, social bond theory, social control mechanisms

Chu et al (2016)

  

x

  

General deterrence theory

Crossler et al (2014)

  

x

  

Protection motivation theory

D’Arcy and Hovav (2007)

  

x

  

General deterrence theory

D’Arcy & Devaraj (2012)

  

x

  

Deterrence theory

D’Arcy and Greene (2014)

  

x

  

Social exchange theory

D’Arcy et al (2009)

  

x

  

General deterrence theory

D’Arcy et al (2014)

  

x

  

Coping theory, moral disengagement theory, social cognitive theory

Dinev & Hu (2007)

  

x

  

Theory of planned behavior

Dinev et al (2009)

  

x

  

Theory of planned behavior

Doherty & Fulford (2005)

    

x

Not applicable or none noted

Doherty & Fulford (2006)

x

    

Not applicable or none noted

Doherty et al (2009)

x

    

Not applicable or none noted

Flowerday & Tuyikeze (2016)

x

x

   

Not applicable or none noted

Foth (2016)

  

x

  

Theory of planned behavior, general deterrence theory

Fulford & Doherty (2003)

x

    

Not applicable or none noted

Gaunt (1998)

 

x

   

Not applicable or none noted

Goel & Chengalur-Smith (2010)

x

    

Not applicable or none noted

Goo et al (2014)

  

x

  

Safety climate and performance model

Gritzalis (1997)

x

    

Not applicable or none noted

Guo & Yuan (2012)

  

x

  

Deterrence theory, social cognitive theory

Guo et al (2011)

  

x

  

Composite behavior model

Han et al (2017)

  

x

  

Rational choice theory

Harrington (1996)

  

x

  

Deterrence theory

Hedström et al (2011)

  

x

  

Value-based compliance model

Herath & Rao (2009a)

  

x

  

General deterrence theory, protection motivation theory

Herath & Rao (2009b)

  

x

  

General deterrence theory, agency theory

Höne and Eloff (2002a)

x

    

Not applicable or none noted

Höne and Eloff (2002b)

x

    

Not applicable or none noted

Hong et al (2006)

x

    

Integrated system theory of information security management

Hovav & D’Arcy (2012)

  

x

  

Deterrence theory

Hsu et al (2015)

  

x

x

 

Social control theory

Hu et al (2011)

  

x

  

Deterrence theory, rational choice theory, self-control theory

Hu et al (2012)

  

x

  

Theory of planned behavior

Hu et al (2015)

  

x

  

Self-control theory

Hwang et al (2017)

  

x

  

Protection motivation theory

Ifinedo (2012)

  

x

  

Theory of planned behavior, protection motivation theory

Ifinedo (2014)

  

x

  

Theory of planned behavior, social cognitive theory, social bond theory

Ifinedo (2016)

  

x

  

General deterrence theory, rational choice theory, organizational climate perspective

Johnston & Warkentin (2010a)

  

x

  

Protection motivation theory, fear appeals model

Johnston & Warkentin (2010b)

  

x

  

Not applicable or none noted

Johnston et al (2013)

 

x

   

Social cognitive theory

Johnston et al (2015)

  

x

  

Protection motivation theory, deterrence theory

Johnston et al (2016)

  

x

  

Protection motivation theory, general deterrence theory

Kadam (2007)

x

    

Not applicable or none noted

Karyda et al (2005)

x

x

  

x

Not applicable or none noted

Kim et al (2016)

  

x

  

Abuse opportunity structure, emotion process model

Knapp et al (2006)

 

x

   

Grounded theory

Knapp et al (2009)

x

x

  

x

Grounded theory

Knapp & Ferrante (2012)

   

x

x

General deterrence theory, theory of organizational learning

Lee and Larson (2009)

  

x

  

Protection motivation theory

Lee and Lee (2002)

  

x

  

General deterrence theory, social bond theory, social learning theory

Lee et al (2004)

  

x

  

General deterrence theory, social control theory, theory of planned behavior

Lee et al (2016)

 

x

   

Person-environment fit theory

Li et al (2010)

  

x

  

Rational choice theory

Li et al (2014)

  

x

  

Organizational justice

Liao et al (2009)

  

x

  

Theory of planned behavior, deterrence theory, theory of ethics

Liang et al (2013)

  

x

  

Control theory, regulatory focus theory

Lowry & Moody (2015)

 

x

x

  

Organizational control theory, reactance theory

Lowry et al (2015)

  

x

  

Fairness theory, reactance theory

Moquin & Wakefield (2016)

  

x

  

Protection motivation theory, theory of planned behavior

Myyry et al (2009)

  

x

  

Theory of cognitive moral

development, theory of motivational types of values

Ng et al (2009)

  

x

  

Health belief model

Padayachee (2012)

  

x

  

Self-determination theory

Pathari & Sonar (2012)

x

    

Not applicable or none noted

Posey et al (2011a)

  

x

  

Causal reasoning theory, attribution theory

Posey et al (2015)

  

x

  

Protection motivation theory, organizational commitment

Puhakainen & Siponen (2010)

  

x

  

Universal constructive instructional theory, elaboration likelihood model

Rees et al (2003)

x

   

x

Not applicable or none noted

Renaud & Goucher (2012)

 

x

   

Not applicable or none noted

Safa et al (2016)

  

x

  

Social bond theory, involvement theory

Shephard & Mejias (2016)

  

x

  

General deterrence theory, rational choice theory, agency theory

Shropshire et al (2015)

  

x

  

Theory of reasoned action, technology acceptance model

Siponen (2000)

 

x

   

Theory of reasoned action, theory of planned behavior, intrinsic motivation, technology acceptance model

Siponen (2006)

x

    

Not applicable or none noted

Siponen & Iivari (2006)

  

x

  

Conservative-deontological theory, liberal-intuitive theory, prima-facie theory, virtue theory, utilitarian theory, universalizability theory

Siponen & Vance (2010)

  

x

  

Neutralization theory, general deterrence theory

Siponen & Willison (2009)

x

    

Not applicable or none noted

Siponen et al (2009)

  

x

  

Theory of reasoned action, protection motivation theory

Siponen et al (2010)

  

x

  

Protection motivation theory, deterrence theory, theory of reasoned action, innovation diffusion theory

Siponen et al (2014)

  

x

  

Protection motivation theory, theory of reasoned action, cognitive evaluation theory

Sommestad et al (2015)

  

x

  

Theory of planned behavior, protection motivation theory

Son (2011)

  

x

  

General deterrence theory, intrinsic and extrinsic motivation models

Park & Son (2016)

  

x

  

Procedural justice

Spears & Barki (2010)

  

x

x

 

Buy-in theory of participation, system quality theory, emergent interactions theory

Stahl et al (2012)

 

x

   

Critical social theory

Straub (1990)

  

x

  

General deterrence theory

Teh et al (2015)

  

x

  

Social exchange theory

Tsohou et al (2015b)

 

x

   

Actor-network theory, structuration theory, contextualism

Vaast (2007)

 

x

   

Not applicable or none noted

Vance & Siponen (2012)

  

x

  

Rational choice theory

Vance et al (2012)

  

x

  

Protection motivation theory, habit theory

Vance et al (2013)

  

x

  

Theory of accountability

Vance et al (2015)

  

x

  

Accountability theory

von Solms (1999)

x

    

Not applicable or none noted

Wall (2013)

x

 

x

  

Not applicable or none noted

Wall et al (2013)

     

Self-determination theory, psychological reactance theory

Warkentin et al (2011)

  

x

  

Social learning theory

Warman (1992)

x

    

Not applicable or none noted

Wiant (2005)

   

x

 

Deterrence theory

Wood (1982)

x

   

x

Not applicable or none noted

Workman et al (2008)

  

x

  

Threat control model, social cognitive theory, protection motivation theory

Xue et al (2011)

  

x

  

Technology acceptance model

Yazdanmehr & Wang (2016)

  

x

  

Norm activation theory, social norms theory

Zhang et al (2009)

  

x

  

Risk compensation theory, theory of planned behavior

Total articles

20

15

81

4

6

 

Appendix G: Overview of Supplementary Theories and Approaches

Informing theory or approach

Summary

Boundary conditions and assumptions

Limitations

References

Control theory

Control theory examines the managerial design and implementation of mechanisms that attempt to affect the behavior of another person or group as a means to achieve organizational goals. Key areas of focus include the antecedents to control choice (e.g., behavior observability) and the characteristics of control (e.g., control mode, degree, style)

Control theory assumes a clear division of roles between controllers (e.g., managers) and controllees (e.g., staff)

Control theory focuses primarily around the controller’s concern for the organization’s ability to capture value

Where organizational structure and job roles are ambiguous, control theory is less helpful in clarifying controller–controlee interactions

Control research within IS has been largely focused on systems development processes

Cram et al (2016b), Davis (1940), Flamholtz et al (1985), Remus et al (2015), Tannenbaum (1962), Wiener et al (2016)

Institutional theory

Institutional theory considers the norms, processes, and routines within organizations associated with social behavior

Where organizational structures are viewed as being legitimate, fair, and just, employees are more likely to perform their responsibilities more effectively, including complying with rules and regulations

Institutional theory deemphasizes the individual interests of actors, in favor of institutional influences

DiMaggio (1988),

Jaffee (1991), Meyer and Rowan (1977), Niehoff and Moorman (1993), Schnedler and Vadovic (2011), Scott (1987), Workman (2009)

Replication and longitudinal research

Replication research seeks to obtain the same results as previous studies by either reproducing similar conditions or deliberately introducing variations to the conditions (e.g., data set, population) of the original study

Longitudinal research draws on data from multiple points in time

Replication research relies on the prior publication of work that allows for a reproduction of similar study conditions or a deliberate variation of particular study conditions

Longitudinal research aims to identify causal factors by uncovering changes that occur over time

Replication research is not always identified as such and comprises only a small proportion of published research

Longitudinal research introduces challenges in terms of data collection difficulties (e.g., finding organizations or individuals willing to participate on multiple occasions)

Lindsay and Ehrenberg (1993), Salterio (2014), Tsang and Kwan (1999)

Agency theory

Agency theory examines the relationship between two parties, the principal and agent, and the challenges that arise from their conflicting goals and the limited ability of the principal to oversee the agent’s work

Applications of agency theory commonly assume that (1) agents act primarily out of self-interest; (2) the goals of principals and agents conflict; and (3) information asymmetry exists between principals and agents

Agency relationships can apply in a variety of settings, including owner-manager and manager-subordinate

Agency theory is most useful in situations where principal–agent goal conflict and/or information asymmetry is high

Agency theory has been criticized for being narrow in scope and difficult to test

Eisenhardt (1989), Jensen and Meckling (1976), Perrow (1986), Sharma (1997), Zsidisin and Ellram (2003)

Work systems theory, cybernetics

Work systems theory considers the circumstances where humans and machines perform work using information and technology, while accounting for the planned and unplanned changes that occur within such systems. A cybernetic process is one that uses a feedback loop to set goals, determine achievement against those goals, and make ongoing corrections

Systems and processes are standardized and measurable. Where performance variances are identified within the systems, the related information can be used to resolve the problems that exist. Work systems theory and cybernetics can apply to both technical processes, as well as sociotechnical systems

In processes that are unstandardized, difficult to measure, or information isn’t available to make corrections, feedback loops may be less helpful

Alter (2013), Hofstede (1978)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cram, W.A., Proudfoot, J.G. & D’Arcy, J. Organizational information security policies: a review and research framework. Eur J Inf Syst 26, 605–641 (2017). https://doi.org/10.1057/s41303-017-0059-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41303-017-0059-9

Keywords

Navigation