Skip to main navigation Skip to search Skip to main content

Understanding insiders: Theories and challenges in information security policy compliance research

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

1 Scopus citations

Abstract

Studies in information security policy compliance (ISPC) have used a number of behavioral theories from criminology, public health, and economics research to understand why individuals inside organizations commit security policy violations. These theories and empirical studies have broadened our understanding of some of the most prevalent and most difficult to address causes of information security incidents: Non-malicious and malicious acts of policy violations. However, there are a number of issues with current studies and certain observations that may be fruitful to address, both for future research as well as for practitioners in organizations. In this chapter, I summarize some of the major behavioral frameworks used in ISPC research, indicating the main causal variables studied, the results of these investigations, as well as practical implications for organizations. Given that many of the studies that adopt a rational actor perspective and a cost-benefit calculus have not obtained consistent results, I suggest a set of variables and behavioral effects that highlight how individuals commit a plethora of non-rational acts in their day-to-day activities, and that this basic understanding of human biases may be fruitful in the information security context. Moreover, I point to methodological challenges regarding self-reported studies and the problem of non-malicious acts being mixed with malicious acts. Lastly, I identify ethical challenges in controlling employee behavior and the importance of understanding behavioral ethics in the information security context and organizational settings.

Original languageEnglish
Title of host publicationWorld Scientific Reference On Innovation
PublisherWorld Scientific Publishing Co. Pte Ltd
Pages27-45
Number of pages19
Volume4
ISBN (Electronic)9789813147034
ISBN (Print)9789813147027
DOIs
StatePublished - Mar 20 2018

Keywords

  • Behavioral security
  • Ethics
  • Information security policy
  • Insider threat

Fingerprint

Dive into the research topics of 'Understanding insiders: Theories and challenges in information security policy compliance research'. Together they form a unique fingerprint.

Cite this