Location
67.303
Start Date
5-12-2016 11:30 AM
End Date
5-12-2016 12:00 PM
Presentation Type
Paper
Description
Abstract: This paper examines potential impacts of organisational factors on security compliance by applying the “work-stress model” of the Job Demands-Resources model to security behaviour. The paper proposes that IT users’ compliance burnout and security engagement are results of coping with security demands and receiving resources respectively. Compliance burnout would reduce security compliance while security engagement would increase it. The security compliance model developed in this study emphasises developing emotional and cognitive resources from system users through effective provision of organisational resources and security requirements to promote desired security practice. Further assessment of the proposed model in this paper would extend behavioural security compliance research through employing a new organisational theory and enable organisations to focus on specific resources and design of security requirements that most encourage IT users’ safe security behaviour.
Stress-Based IS Security Compliance: Towards a Conceptual Model
67.303
Abstract: This paper examines potential impacts of organisational factors on security compliance by applying the “work-stress model” of the Job Demands-Resources model to security behaviour. The paper proposes that IT users’ compliance burnout and security engagement are results of coping with security demands and receiving resources respectively. Compliance burnout would reduce security compliance while security engagement would increase it. The security compliance model developed in this study emphasises developing emotional and cognitive resources from system users through effective provision of organisational resources and security requirements to promote desired security practice. Further assessment of the proposed model in this paper would extend behavioural security compliance research through employing a new organisational theory and enable organisations to focus on specific resources and design of security requirements that most encourage IT users’ safe security behaviour.