Chrome Extension
WeChat Mini Program
Use on ChatGLM

Towards A User-Centric Theory Of Value-Driven Information Security Compliance

INFORMATION TECHNOLOGY & PEOPLE(2018)

Cited 23|Views3
No score
Abstract
Purpose The purpose of this paper is to fill a gap in the literature, by investigating the relationship between users' perceptions of the value of the information that they are handling, and their resultant level of compliance with their organisation's information security policies. In so doing, the authors seek to develop a theory of value-driven information security compliance.Design/methodology/approach An interpretive, grounded theory research approach has been adopted to generate a qualitative data set, based upon the results of 55 interviews with key informants from governmental agencies based within Brunei Darussalam, complemented by the results of seven focus groups. The interviews and focus groups were conducted in two phases, so that the results of the first phase could be used to inform the second phase data collection exercise, and the thematic analysis of the research data was conducted using the NVivo 11-Plus software.Findings The findings suggest that, when assigning value to their information, users take into account the views of members of their immediate work-group and the espoused views of their organisation, as well as a variety of contextual factors, relating to culture, ethics and education. Perhaps more importantly, it has been demonstrated that the users' perception of information value has a marked impact upon their willingness to comply with security policies and protocols.Research limitations/implications Although the authors have been able to develop a rich model of information value and security compliance, the qualitative nature of this research means that it has not been tested, in the numerical sense. However, this study still has important implications for both research and practice. Specifically, researchers should consider users' perceptions of information value, when conducting future studies of information security compliance.Practical implications Managers and practitioners will be better able to get their colleagues to comply with information security protocols, if they can take active steps to convince them that the information that they are handling is a valuable organisational resource, which needs to be protected.Originality/value The central contribution is a novel model of information security compliance that centre stages the role of the users' perceptions of information value, as this is a factor which has been largely ignored in contemporary accounts of compliance behaviour. This study is also original, in that it fills a methodological gap, by balancing the voices of both user representatives and senior organisational stakeholders, in a single study.
More
Translated text
Key words
Grounded theory,Behaviour,IT policy,Information,Security,Information value,Interpretivist research,Information security,Information users,User compliance behaviours
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined