DSpace Repository

Information Security Policy Compliance Model in Organizations: Social Bond Theory

Show simple item record

dc.contributor.author Haider, Tahsin
dc.date.accessioned 2023-02-15T08:54:19Z
dc.date.available 2023-02-15T08:54:19Z
dc.date.issued 22-12-15
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/9639
dc.description.abstract The internet and other forms of information technology have had a huge impact on people's everyday lives. However, individuals and organizations still place a significant amount of importance on the protection of sensitive data. When it comes to information security, humans should be taken into consideration in addition to technological factors. Technology alone is not sufficient to provide a secure environment for information. Users might be irresponsible, obstinate pranksters, don't care enough about information security, don't care at all, or don't care enough to make errors because they don't know enough about information security. A novel model was developed for the purpose of this research, which reveals how the conduct of workers is impacted by how effectively they follow the information security regulations of their firm. The way in which attachment, commitment, and personal standards were conceived of is the most essential aspect of this study. All three of these concepts are crucial components of the Social Bond Theory. The analysis of the data revealed that there are a number of factors that have a significant impact on how employees feel about adhering to the organization's information security policies. These factors include the sharing of information security knowledge, working together, intervening, and having experience. On the other hand, workers' attitudes on adhering to the information security policy are not much impacted by attachment. The findings also indicate that an employee's attitude may be influenced by the degree to which they are committed to their job as well as by their own personal standards. The level of compliance with organizational rules concerning information security is significantly impacted not only by one's attitude but also by one's behavioral intention with respect to information security compliance. Ke ywo rds :Attitude structural equation, Information security, Confirmatory factor analysis, Information security awareness, Structural equation modelling, Involvement. en_US
dc.language.iso en_US en_US
dc.publisher Daffodil International University en_US
dc.subject Information technology en_US
dc.subject Organizations en_US
dc.subject Information security en_US
dc.title Information Security Policy Compliance Model in Organizations: Social Bond Theory en_US
dc.type Other en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


My Account