IDEAS home Printed from https://ideas.repec.org/a/eee/ininma/v45y2019icp13-24.html
   My bibliography  Save this article

Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior

Author

Listed:
  • Li, Ling
  • He, Wu
  • Xu, Li
  • Ash, Ivan
  • Anwar, Mohd
  • Yuan, Xiaohong

Abstract

As internet technology and mobile applications increase in volume and complexity, malicious cyber-attacks are evolving, and as a result society is facing greater security risks in cyberspace more than ever before. This study has extended the published literature on cybersecurity by theoretically defining the conceptual domains of employees’ security behavior, and developed and tested operational measures to advance information security behavior research in the workplace. A conceptual framework is proposed and tested using survey results from 579 business managers and professionals. Structural equation modeling and ANOVA procedures are employed to test the proposed hypotheses. The results show that when employees are aware of their company’s information security policy and procedures, they are more competent to manage cybersecurity tasks than those who are not aware of their companies’ cybersecurity policies. The study also indicates that an organizational information security environment positively influences employees’ threat appraisal and coping appraisal abilities, which in turn, positively contribute to their cybersecurity compliance behavior.

Suggested Citation

  • Li, Ling & He, Wu & Xu, Li & Ash, Ivan & Anwar, Mohd & Yuan, Xiaohong, 2019. "Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior," International Journal of Information Management, Elsevier, vol. 45(C), pages 13-24.
  • Handle: RePEc:eee:ininma:v:45:y:2019:i:c:p:13-24
    DOI: 10.1016/j.ijinfomgt.2018.10.017
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0268401218302093
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijinfomgt.2018.10.017?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Aladwani, Adel M. & Dwivedi, Yogesh K., 2018. "Towards a theory of SocioCitizenry: Quality anticipation, trust configuration, and approved adaptation of governmental social media," International Journal of Information Management, Elsevier, vol. 43(C), pages 261-272.
    2. Shiau, Wen-Lung & Dwivedi, Yogesh K. & Lai, He-Hong, 2018. "Examining the core knowledge on facebook," International Journal of Information Management, Elsevier, vol. 43(C), pages 52-63.
    3. Ahmad, Atif & Maynard, Sean B & Shanks, Graeme, 2015. "A case analysis of information systems and security incident responses," International Journal of Information Management, Elsevier, vol. 35(6), pages 717-723.
    4. Kawaljeet Kaur Kapoor & Kuttimani Tamilmani & Nripendra P. Rana & Pushp Patil & Yogesh K. Dwivedi & Sridhar Nerur, 2018. "Advances in Social Media Research: Past, Present and Future," Information Systems Frontiers, Springer, vol. 20(3), pages 531-558, June.
    5. Moon, Yun Ji & Choi, Myeonggil & Armstrong, Deborah J., 2018. "The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations," International Journal of Information Management, Elsevier, vol. 40(C), pages 54-66.
    6. Khansa, Lara & Liginlal, Divakaran, 2012. "Whither information security? Examining the complementarities and substitutive effects among IT and information security firms," International Journal of Information Management, Elsevier, vol. 32(3), pages 271-281.
    7. Soomro, Zahoor Ahmed & Shah, Mahmood Hussain & Ahmed, Javed, 2016. "Information security management needs more holistic approach: A literature review," International Journal of Information Management, Elsevier, vol. 36(2), pages 215-225.
    8. Shiau, Wen-Lung & Dwivedi, Yogesh K. & Yang, Han Suan, 2017. "Co-citation and cluster analyses of extant literature on social networks," International Journal of Information Management, Elsevier, vol. 37(5), pages 390-399.
    9. John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Berger, Allen N. & Öztekin, Özde & Roman, Raluca A., 2023. "Geographic deregulation and bank capital structure," Journal of Banking & Finance, Elsevier, vol. 149(C).
    2. Naume Sonhera & David Mhlanga, 2022. "Reducing Cyber Incidents through Good Online Behavioral Norms: Lessons from South Africa," Eurasian Journal of Social Sciences, Eurasian Publications, vol. 10(1), pages 37-48.
    3. Han, Kookyoung & Choi, Jin Hyuk, 2023. "Implications of false alarms in dynamic games on cyber-security," Chaos, Solitons & Fractals, Elsevier, vol. 169(C).
    4. Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
    5. Wing Fung Chong & Runhuan Feng & Hins Hu & Linfeng Zhang, 2022. "Cyber Risk Assessment for Capital Management," Papers 2205.08435, arXiv.org, revised Oct 2023.
    6. Tahereh Hasani & Norman O’Reilly & Ali Dehghantanha & Davar Rezania & Nadège Levallet, 2023. "Evaluating the adoption of cybersecurity and its influence on organizational performance," SN Business & Economics, Springer, vol. 3(5), pages 1-38, May.
    7. Ahu Ergen & Ahmet Naci Ünal & Mehmet Sıtkı Saygili, 2021. "Is It Possible to Change the Cyber Security Behaviours of Employees? Barriers and Promoters," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 10, July.
    8. Percia David, Dimitri & Maréchal, Loïc & Lacube, William & Gillard, Sébastien & Tsesmelis, Michael & Maillart, Thomas & Mermoud, Alain, 2023. "Measuring security development in information technologies: A scientometric framework using arXiv e-prints," Technological Forecasting and Social Change, Elsevier, vol. 188(C).
    9. Ou, Carol & Zhang, Xiaowei & Angelopoulos, Spyros & Davison, Robert & Janse, Noury, 2022. "Security breaches and organization response strategy : Exploring consumers’ threat and coping appraisals," Other publications TiSEM 9ac0c2eb-87e8-4c1d-a0b0-c, Tilburg University, School of Economics and Management.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Taneja, Anu & Arora, Anuja, 2019. "Modeling user preferences using neural networks and tensor factorization model," International Journal of Information Management, Elsevier, vol. 45(C), pages 132-148.
    2. Lu, Chih-Cheng & Wu, Ing-Long & Hsiao, Wei-Hung, 2019. "Developing customer product loyalty through mobile advertising: Affective and cognitive perspectives," International Journal of Information Management, Elsevier, vol. 47(C), pages 101-111.
    3. Agarwal, Shweta & Kumar, Shailendra & Goel, Utkarsh, 2019. "Stock market response to information diffusion through internet sources: A literature review," International Journal of Information Management, Elsevier, vol. 45(C), pages 118-131.
    4. Shi, Si & Cao, Yu & Chen, Yang & Chow, Wing S., 2019. "How social media brand pages contribute to functional conflict: The central role of commitment," International Journal of Information Management, Elsevier, vol. 45(C), pages 95-106.
    5. Saito, Taiga & Takahashi, Akihiko & Koide, Noriaki & Ichifuji, Yu, 2019. "Application of online booking data to hotel revenue management," International Journal of Information Management, Elsevier, vol. 46(C), pages 37-53.
    6. Cao, Xiongfei & Yu, Lingling, 2019. "Exploring the influence of excessive social media use at work: A three-dimension usage perspective," International Journal of Information Management, Elsevier, vol. 46(C), pages 83-92.
    7. Wang, Xuequn & Lin, Xiaolin & Spencer, Marilyn K., 2019. "Exploring the effects of extrinsic motivation on consumer behaviors in social commerce: Revealing consumers’ perceptions of social commerce benefits," International Journal of Information Management, Elsevier, vol. 45(C), pages 163-175.
    8. Azaizah, Nadeem & Reychav, Iris & Raban, Daphne R. & Simon, Tomer & McHaney, Roger, 2018. "Impact of ESN implementation on communication and knowledge-sharing in a multi-national organization," International Journal of Information Management, Elsevier, vol. 43(C), pages 284-294.
    9. Hassan, Lobna & Dias, Antonio & Hamari, Juho, 2019. "How motivational feedback increases user’s benefits and continued use: A study on gamification, quantified-self and social networking," International Journal of Information Management, Elsevier, vol. 46(C), pages 151-162.
    10. Cheng, Xusen & Gu, Yu & Shen, Jia, 2019. "An integrated view of particularized trust in social commerce: An empirical investigation," International Journal of Information Management, Elsevier, vol. 45(C), pages 1-12.
    11. Shao, Zhen & Pan, Zhengyuan, 2019. "Building Guanxi network in the mobile social platform: A social capital perspective," International Journal of Information Management, Elsevier, vol. 44(C), pages 109-120.
    12. Baillette, Paméla & Barlette, Yves & Leclercq-Vandelannoitte, Aurélie, 2018. "Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users," International Journal of Information Management, Elsevier, vol. 43(C), pages 76-84.
    13. Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
    14. Schomakers, Eva-Maria & Lidynia, Chantal & Müllmann, Dirk & Ziefle, Martina, 2019. "Internet users’ perceptions of information sensitivity – insights from Germany," International Journal of Information Management, Elsevier, vol. 46(C), pages 142-150.
    15. Meng Wang & Yalin Qin & Jiaojiao Liu & Weidong Li, 2023. "Identifying personal physiological data risks to the Internet of Everything: the case of facial data breach risks," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-15, December.
    16. Son, Jaebong & Lee, Hyung Koo & Jin, Sung & Lee, Jintae, 2019. "Content features of tweets for effective communication during disasters: A media synchronicity theory perspective," International Journal of Information Management, Elsevier, vol. 45(C), pages 56-68.
    17. Shiau, Wen-Lung & Dwivedi, Yogesh K. & Lai, He-Hong, 2018. "Examining the core knowledge on facebook," International Journal of Information Management, Elsevier, vol. 43(C), pages 52-63.
    18. Wang, Yichuan & Herrando, Carolina, 2019. "Does privacy assurance on social commerce sites matter to millennials?," International Journal of Information Management, Elsevier, vol. 44(C), pages 164-177.
    19. Irina Wedel & Michael Palk & Stefan Voß, 2022. "A Bilingual Comparison of Sentiment and Topics for a Product Event on Twitter," Information Systems Frontiers, Springer, vol. 24(5), pages 1635-1646, October.
    20. Naveena Prakasam & Louisa Huxtable-Thomas, 2021. "Reddit: Affordances as an Enabler for Shifting Loyalties," Information Systems Frontiers, Springer, vol. 23(3), pages 723-751, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ininma:v:45:y:2019:i:c:p:13-24. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-information-management .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.