A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate


Research downside: Although organizations have been exerting a important effort to leverage policies and procedures to boost data security, their impact and effectiveness is under scrutiny as employees' compliance with data security procedures remains problematic. Research questions: (one) What is that the role of knowledge security climate (ISC) in cultivating individual's compliance with security policy? (two) Do individual affective and normative states mediate the impact of ISC to extend security policy compliance intention whereas thwarting employees' security avoidance? Literature review: Drawing upon Griffin and Neal's safety climate model, which states the result of safety climate on individual safety behaviors that cause specific performance outcomes, we have a tendency to develop an ISC model to empirically examine the efficacy of security climate in governing employee's policy compliance. The literature suggests that there might be practical reasons for workers not to observe the protection policies and procedures. These transcend the simple lack of use or negligence, and include rationalizing security violation, particularly in light of the very fact that they are underneath pressure to induce one thing done without delays in daily work. To empirically address such employee behavior, we used the term, security avoidance during this study-an employee's deliberate intention to avoid security policies or procedures in daily work despite the necessity and opportunity to do thus. Methodology: We tend to surveyed IT users in South Korea regarding people' perception about numerous organizational/managerial data security practices in the work atmosphere. Results and discussion: The results from 581 participants strongly support the elemental proposition that the data security climate features a important positive impact on employee's conformity with the safety policy. The study additionally reveals that the safety climate nurtures the employee's affective and cognitive states - hrough affective commitment and normative commitment. These, in turn, mediate the influence of security climate on employee policy compliance by facilitating rule adherence among workers while, at the identical time, inspiring self-adjusted behaviors to neutralize their deliberate intents of negligence. Overall, the findings support our read that the creation of strong security climate is that the adequate different to a sanction-based deterrence to workers' security policy compliance, which limits the presence of security avoidance. The implications to theory are the multidimensional nature of ISC construct and its linkage to a systematic view of individual level data security activities. The implications to follow are the ISC's favorable role of discouraging employee's security avoidance while inducing the security policy compliance intention at the same time, given the limit of sanctions.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Path Finding for Maximum Value of Information in Multi-Modal Underwater Wireless Sensor Networks - 2018ABSTRACT:We contemplate underwater multi-modal wireless sensor networks (UWSNs) appropriate for applications
PROJECT TITLE :Low Complexity and Critical Path based VLSI Architecture for LMS Adaptive Filter using Distributed Arithmetic - 2017ABSTRACT:This paper presents a new architecture for distributed arithmetic (DA) based Least Mean
PROJECT TITLE :Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers - 2017ABSTRACT:In recent years, there are increasing interests in using path identifiers (PIDs) as inter-domain routing objects.
PROJECT TITLE: Critical Path Analysis and Low Complexity Implementation of the LMS Adaptive Algorithm - 2014 ABSTRACT: This project presents a precise analysis of the critical path of the least-mean-square (LMS) adaptive filter
PROJECT TITLE :Detection of Hardware Trojan in SEA Using Path Delay (2014)ABSTRACT :Detecting hardware Trojan is a difficult task in general. The context is that of a fabless design house that sells IP blocks as GDSII hard macros,

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry