A4 Article in conference proceedings
Investigating the Impact of Organizational Culture on Information Security Policy Compliance : The Case of Ethiopia (2021)
Ejigu, K. T., Siponen, M., & Arage, T. M. (2021). Investigating the Impact of Organizational Culture on Information Security Policy Compliance : The Case of Ethiopia. In AMCIS 2021 : Proceedings of the 27th Americas Conference on Information Systems (Article 10). Association for Information Systems. https://aisel.aisnet.org/amcis2021/info_security/info_security/10/
JYU authors or editors
Publication details
All authors or editors: Ejigu, Kibrom Tadesse; Siponen, Mikko; Arage, Tilahun Muluneh
Parent publication: AMCIS 2021 : Proceedings of the 27th Americas Conference on Information Systems
Conference:
- Americas Conference on Information Systems
Place and date of conference: Montreal, Canada (Virtual conference), 9.-13.8.2021
eISBN: 978-1-7336325-8-4
Publication year: 2021
Article number: 10
Publisher: Association for Information Systems
Publication country: United States
Publication language: English
Persistent website address: https://aisel.aisnet.org/amcis2021/info_security/info_security/10/
Publication open access: Not open
Publication channel open access:
Publication is parallel published (JYX): https://jyx.jyu.fi/handle/123456789/79181
Abstract
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most of the security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply with information security policies (ISP). A rational choice theory and a computing value framework construct are used to build and evaluate an empirical ISP compliance model. A survey method used to collect data from Ethiopia.
Keywords: data security; organisations (systems); organisational culture; data security policy; data protection; rational choice theory
Free keywords: information security policy compliance; organizational culture; Rational Choice Theory; computing value framework
Contributing organizations
Ministry reporting: Yes
Preliminary JUFO rating: 1