A framework for reporting and dealing with end-user security policy compliance

Author:

Alotaibi Mutlaq Jalimid,Furnell Steven,Clarke Nathan

Abstract

Purpose It is widely acknowledged that non-compliance of employees with information security polices is one of the major challenges facing organisations. This paper aims to propose a model that is intended to provide a comprehensive framework for raising the level of compliance amongst end-users, with the aim of monitoring, measuring and responding to users’ behaviour with an information security policy. Design/methodology/approach The proposed model is based on two main concepts: a taxonomy of the response strategy to non-compliant behaviour and a compliance points system. The response taxonomy comprises two categories: awareness raising and enforcement of the security policy. The compliance points system is used to reward compliant behaviour and penalise non-compliant behaviour. Findings A prototype system has been developed to simulate the proposed model and work as a real system that responds to the behaviour of users (reflecting both violations and compliance behaviour). In addition, the model has been evaluated by interviewing experts from academic and industry. They considered the proposed model to offers a novel approach for managing end users’ behaviour with the information security policies. Research limitations/implications Psychological factors were out of the research scope at this stage. The proposed model may have some psychological impacts upon users; therefore, this issue needs to be considered by studying the potential impacts and the best solutions. Originality/value Users being compliant with the information security policies of their organisation is the key to strengthen information security. Therefore, when employees have a good level of compliance with security policies, this positively affects the overall security of an organisation.

Publisher

Emerald

Subject

Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems

Reference19 articles.

1. Security policy compliance: user acceptance perspective,2011

2. Information security culture: a behaviour compliance conceptual framework,2010

3. Information security policies: a review of challenges and influencing factors,2016

4. Towards dynamic adaption of user’s organisational information security behaviour,2015

5. Information security: to determine its level of awareness in an organization,2013

Cited by 15 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. VISTA: An inclusive insider threat taxonomy, with mitigation strategies;Information & Management;2024-01

2. A Holistic Evaluation Model for Information Security Awareness Programs in Work Environment;2023 Eighth International Conference On Mobile And Secure Services (MobiSecServ);2023-11-04

3. Empowering Information Security Managers: Tailored Information Security Policy Design with POLCO Software;Proceedings of the 31st International Conference on Information Systems Development;2023-10-05

4. A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field;Applied Sciences;2023-08-28

5. Analyzing Information Security Among Nonmalicious Employees;Intelligent Systems and Networks;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3