首页    期刊浏览 2024年10月06日 星期日
登录注册

文章基本信息

  • 标题:Predicting communication constructs towards determining information security policies compliance
  • 本地全文:下载
  • 作者:Tsholofelo Rantao ; Kennedy Njenga
  • 期刊名称:South African Journal of Information Management
  • 印刷版ISSN:2078-1865
  • 电子版ISSN:1560-683X
  • 出版年度:2020
  • 卷号:22
  • 期号:1
  • 页码:1-10
  • DOI:10.4102/sajim.v22i1.1211
  • 出版社:Sabinet Online
  • 摘要:Background: Ineffective communication using inappropriate channels and poor listening skills have resulted in poor compliance with information security (InfoSec) policies. Lack of compliance with InfoSec policies minimises employee proficiency whilst also exposing organisations to business risk.Objectives: This research addresses management’s concern regarding why employees do not comply with InfoSec policies and proposes that how policies are communicated is integral to compliance and that effective communication can serve to ameliorate compliance.Method: The research adopts communication theories from knowledge management, psychology and information systems to draw on important constructs which are then tested in order to identify those that can strongly predict InfoSec policy compliance. The research was quantitative and used a survey to elicit responses from a sample of 100 employees selected from 6 organisations.Results: Our findings suggest that of the 10 communication constructs used in the miscellany of perception and determinism (MPD) framework, half of these (five) constructs strongly predicated compliance, namely reasons for communication, media appropriateness, non-conflicting interpretations, feedback immediacy and personal focus. The rest of the constructs were weak predictors or could not predict compliance.Conclusion: The research advances InfoSec literature by adapting the MPD model as integral to the development, communication and importantly, compliance with InfoSec policies. The MPD model is pertinent as it aggregates theories of communication from a number of academic disciplines and underpinnings not considered before, thereby improving our understanding on how we communicate InfoSec policies for better compliance.
  • 关键词:information security; policies; compliance; perception theories; determinism theories
国家哲学社会科学文献中心版权所有