A4 Article in conference proceedings
Investigating the Impact of Organizational Culture on Information Security Policy Compliance : The Case of Ethiopia (2021)


Ejigu, K. T., Siponen, M., & Arage, T. M. (2021). Investigating the Impact of Organizational Culture on Information Security Policy Compliance : The Case of Ethiopia. In AMCIS 2021 : Proceedings of the 27th Americas Conference on Information Systems (Article 10). Association for Information Systems. https://aisel.aisnet.org/amcis2021/info_security/info_security/10/


JYU authors or editors


Publication details

All authors or editors: Ejigu, Kibrom Tadesse; Siponen, Mikko; Arage, Tilahun Muluneh

Parent publication: AMCIS 2021 : Proceedings of the 27th Americas Conference on Information Systems

Conference:

  • Americas Conference on Information Systems

Place and date of conference: Montreal, Canada (Virtual conference), 9.-13.8.2021

eISBN: 978-1-7336325-8-4

Publication year: 2021

Article number: 10

Publisher: Association for Information Systems

Publication country: United States

Publication language: English

Persistent website address: https://aisel.aisnet.org/amcis2021/info_security/info_security/10/

Publication open access: Not open

Publication channel open access:

Publication is parallel published (JYX): https://jyx.jyu.fi/handle/123456789/79181


Abstract

Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most of the security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply with information security policies (ISP). A rational choice theory and a computing value framework construct are used to build and evaluate an empirical ISP compliance model. A survey method used to collect data from Ethiopia.


Keywords: data security; organisations (systems); organisational culture; data security policy; data protection; rational choice theory

Free keywords: information security policy compliance; organizational culture; Rational Choice Theory; computing value framework


Contributing organizations


Ministry reporting: Yes

Preliminary JUFO rating: 1


Last updated on 2022-17-06 at 10:38