To read this content please select one of the options below:

The role of norms in information security policy compliance

Isaac Wiafe (Department of Computer Science, University of Ghana, Accra, Ghana)
Felix Nti Koranteng (Department of Information Systems and Innovation, Ghana Institute of Management and Public Administration, Accra, Ghana)
Abigail Wiafe (Faculty of Computing and Information Systems, Ghana Technology University College, Accra, Ghana)
Emmanuel Nyarko Obeng (Department of Computer Science, University of Ghana, Accra, Ghana)
Winfred Yaokumah (Department of Computer Science, University of Ghana, Accra, Ghana)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 19 June 2020

Issue publication date: 4 November 2020

850

Abstract

Purpose

The purpose of this paper is to determine which factors influence information system security policy compliance. It examines how different norms influence compliance intention.

Design/methodology/approach

Based on relevant literature on information system security policy compliance, a research model was developed and validated. An online questionnaire was used to gather data from respondents and partial least square structural equation modelling (PLS-SEM) was used to analyse 432 responses received.

Findings

The results indicated that attitude towards information security compliance mediates the effects of personal norms on compliance intention. In addition, descriptive and subjective norms are significant predictors of personal norms.

Originality/value

Though advancement in technology has reached significant heights, it is still inadequate to guaranteed information systems’ security. Researchers have identified humans to be central in ensuring information security. To this effect, this study provides empirical evidence of the role of norms in influence information security behaviour.

Keywords

Citation

Wiafe, I., Koranteng, F.N., Wiafe, A., Obeng, E.N. and Yaokumah, W. (2020), "The role of norms in information security policy compliance", Information and Computer Security, Vol. 28 No. 5, pp. 743-761. https://doi.org/10.1108/ICS-08-2019-0095

Publisher

:

Emerald Publishing Limited

Copyright © 2020, Emerald Publishing Limited

Related articles