Abstract
IS security policy is one of the essential tools to ensure the secure use of information systems and technological assets. To enhance the effectiveness of policy implementation, organizations rely on security training, education and awareness (STEA) programs to help employees understand the IS security issues of the organization. However, different levels of STEA informativeness may have conflicting effects on employees’ compliance decisions. In addition, the urgency of a task may also lead employees to abandon the compliance decision occasionally. The existing corporate information security policy (ISP) could also serve as a deterrence message that would influence compliance decisions. An experimental survey was conducted to examine this phenomenon and test the related hypotheses. The results of this study can be used to inform and guide researchers and practitioners as to how to better enforce an IS security policy through better implementation of STEA programs and improved design of ISP in different task scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akers, R.: Rational choice, deterrence, and social learning theory in criminology: the path not taken. The Journal of Criminal Law and Criminology 81(3), 653–676 (1990)
Boss, S.R., Kirsch, L.J.: The last line of defense: motivating employees to follow corporate security guidelines. In: Proceedings of the 28th International Conference on Information Systems, Montreal, December 9-12 (2007)
Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly 34(3), 523–548 (2010)
Cavusoglu, H., Mishra, B., Raghunathan, S.: The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce 9(1), 69–104 (2004)
D’Arcy, J., Hovav, A., Galletta, D.: User awareness of security counter-measures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1), 79–98 (2009)
Ernst & Young, Moving beyond compliance: Ernst & Young’s, global information security survey (2008)
Fazio, R.H.: Attitudes as object-evaluation associations: Determinants, consequences, and correlates of attitude accessibility. In: Petty, R.E., Krosnick, J.A. (eds.) Attitude Strength: Antecedents and Consequences, pp. 247–282. Erlbaum, Mahwah (1995)
Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: CSI/FBI computer crime and security survey. Computer Security Institute (2006)
Harrington, S.: The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly 20(3), 257–277 (1996)
Herath, T., Rao, H.R.: Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems 47, 154–165 (2009)
Hui, W., Hu, P.: Examining end-user information security policy compliance: An exploratory study. In: Proceedings of the Workshop on e-Business (WeB), Paris, France, December 13 (2008)
Kuo, F., Hsu, M.: Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics 32, 299–315 (2001)
Liska, A.E., Messner, S.F.: Perspectives on Crime and Deviance, 3rd edn. Prentice Hall, Upper Saddle River (1999)
Malaviya, P.: The moderating influence of advertising context on ad repetition effects: The role of amount and type of elaboration. Journal of Consumer Research 34(1), 32–40 (2007)
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., Vance, A.: What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems 18(2), 126–139 (2009)
Nenkov, G.Y., Inman, J.J., Hulland, J.: Considering the Future: The Conceptualization and Measurement of Elaboration on Potential Outcomes. Journal of Consumer Research 35, 126–141 (2008)
Pahnila, S., Siponen, M., Mahmood, A.: Employees’ behavior towards is security policy compliance. In: Proceedings of the 40th Hawaii International Conference on System Sciences, pp. 156–166. IEEE Computer Society Press, Los Alamitos (2007)
Petty, R.E.: Attitude change. In: Tesser, A. (ed.) Advances in Social Psychology, pp. 194–255. McGraw–Hill, New York (1995)
PricewaterhouseCoopers. Employee behavior key to improving information security, new survey finds, June 23 (2008)
Sagar, R.: Who holds the balance? A missing detail in the debate over balancing security and liberty. Polity 41(2), 166–188 (2009)
Shaw, E., Ruby, K., Post, J.: The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin 2-98, 1–10 (1998)
Siponen, M.T., Vance, A.: Neutralization: new insight into the problem of employee information systems security policy violations. MIS Quarterly 34(3), 487–502 (2010)
Siponen, M.T., Pahnila, S., Mahmood, A.: Employees’ adherence to information security policies: An empirical study. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments, pp. 133–144. Springer, Boston (2007)
Smith, S.M., Fabrigar, L.R., Macdougall, B.L., Wiesenthal, N.L.: The role of amount, cognitive elaboration, and structural consistency of attitude-relevant knowledge in the formation of attitude certainty. European Journal of Social Psychology 38(2), 280–295 (2008)
Stoneburner, G., Goguen, A., Feringa, A.: Risk management guide for information technology systems. NIST Special Publications 800-30, White Paper, United States Department of Commerce, Gaithersburg, MD (2002)
Straub, D.W.: Effective is security: an empirical study. Information Systems Research 1(3), 255–276 (1990)
Street, M.D., Douglas, S.C., Geiger, S.W., Martinko, M.J.: The impact of cognitive expenditure on the ethical decision-making process: The cognitive elaboration model. Organizational Behavior and Human Decision Processes 86(2), 256–277 (2001)
Tyler, T.R., Blader, S.L.: Can Businesses Effectively Regulate Employee Conduct? The Antecedents of Rule Following in Work Settings. Academy of Management Journal 48(6), 1143–1158 (2005)
Warkentin, M., Willison, R.: Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems 18(2), 101–105 (2009)
Warkentin, M., Davis, K., Bekkering, E.: Introducing the check-off password system (cops): An advancement in user authentication methods and information security. Journal of Organizational and End User Computing 16(3), 41–58 (2004)
Williams, K., Hawkins, R.: Perceptual research on general deterrence: a critical review. Law and Society Review 20(4), 545–572 (1986)
Wyer, R.S.: Language and advertising effectiveness: Mediating influences of comprehension and cognitive elaboration. Psychology & Marketing 19(7-8), 693–712 (2002)
Yue, W., Çakanyildirim, M.: Intrusion prevention in information systems: Reactive and proactive response. Journal of Management Information Systems 24(1), 329–353 (2007)
Yue, W., Çakanyildirim, M., Ryu, Y., Liu, D.: Network externalities, layered protection and it security risk management. Decision Support Systems 44(1), 1–16 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, X., Yue, W.T., Sia, C.L. (2012). Cognitive Elaboration on Potential Outcomes and Its Effects on Employees’ Information Security Policy Compliance Intention–Exploring the Key Antecedents. In: Shaw, M.J., Zhang, D., Yue, W.T. (eds) E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. WEB 2011. Lecture Notes in Business Information Processing, vol 108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29873-8_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-29873-8_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29872-1
Online ISBN: 978-3-642-29873-8
eBook Packages: Computer ScienceComputer Science (R0)