Publication:
Systematic Literature Review of Information Security Compliance Behaviour Theories

dc.contributor.authorKuppusamy P.en_US
dc.contributor.authorSamy G.N.en_US
dc.contributor.authorMaarop N.en_US
dc.contributor.authorMagalingam P.en_US
dc.contributor.authorKamaruddin N.en_US
dc.contributor.authorShanmugam B.en_US
dc.contributor.authorPerumal S.en_US
dc.date.accessioned2024-05-29T02:03:55Z
dc.date.available2024-05-29T02:03:55Z
dc.date.issued2020
dc.description.abstractThe paper aims to identify behavioural theories that influence information security policies compliance behaviour. A systematic review of empirical studies from eleven online databases (ACM digital library, Emerald Insight, IEEE Xplore digital library, Springer link, Science direct, Scopus, Web of Science, Oxford academic journals, SAGE journals, Taylor & Francis and Wiley online library) are conducted. This review identified 29 studies met its criterion for inclusion. The investigated theories were extracted and analysed. Total of 19 theories have been identified and studied concerning to security policy compliance behaviour. The result indicated that the most established theories in information security compliance behaviour studies are the Theory of Planned Behavior and Protection Motivation theory. Meanwhile, General Deterrence Theory, Neutralization theory, Social Bond Theory / Social Control Theory are used moderately in this research area. Less explored theories are namely Self Determination Theory, Knowledge, Attitude, and Behavior, Social Cognitive Theory, Involvement Theory, Health belief model, Theory of Interpersonal Behavior, Extended Parallel Processing Model, Organisational Control Theory, Psychological Reactance Theory, Norm Activation Theory, Organizational Behaviour Theory, Cognitive Evaluation Theory and Extended Job Demands-Resources. The results from this review may guide the development and evaluation of theories promoting information security compliance behaviours. This will further contribute in the development of an integrated theory of information security compliance behaviour. � Published under licence by IOP Publishing Ltd.en_US
dc.identifier.doi10.1088/1742-6596/1551/1/012005
dc.identifier.issn17426588
dc.identifier.issue1
dc.identifier.scopus2-s2.0-85087608821
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85087608821&doi=10.1088%2f1742-6596%2f1551%2f1%2f012005&partnerID=40&md5=5db94f6d0828e92a3b939787c70a6487
dc.identifier.urihttps://iopscience.iop.org/article/10.1088/1742-6596/1551/1/012005
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/10276
dc.identifier.volume1551
dc.languageEnglish
dc.language.isoen_USen_US
dc.publisherInstitute of Physics Publishingen_US
dc.relation.ispartofJournal of Physics: Conference Seriesen_US
dc.sourceScopus
dc.subjectbehavioural theoriesen_US
dc.subjectInformation security complianceen_US
dc.subjectinformation security policyen_US
dc.titleSystematic Literature Review of Information Security Compliance Behaviour Theoriesen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Systematic Literature Review of Information Security Compliance Behaviour Theories.pdf
Size:
1.19 MB
Format:
Adobe Portable Document Format

Collections