Visible to the public An Integrated Approach to Information Systems Security Policy Violation: The Case of Ethiopia

TitleAn Integrated Approach to Information Systems Security Policy Violation: The Case of Ethiopia
Publication TypeConference Paper
Year of Publication2016
AuthorsArage, Tilahun Muluneh, Tesema, Tibebe Beshah
Conference NameProceedings of the 10th International Conference on Informatics and Systems
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4062-5
KeywordsCollaboration, composability, deterrence, General Deterrence Theory, Human Behavior, information systems security, Information Systems Security Policy Violation, Metrics, National Culture, pubcrawl, Resiliency, Scalability
Abstract

In today's world, the security of companies' data is given a very big emphasis than ever. Despite huge investments made by companies to keep their systems safe, there are many information systems security breaches that infiltrate companies' systems and consequently affect their economic capacity, reputation, and customers' confidence. The literature suggests that almost all investments in information systems security have been focused only on technological solutions. However, having this partial view on the complex information systems security problem is found to be insufficient and hence there is an increasing call for researchers to include social factors into the solution space. One of such social factor is culture. Thus, in this research we studied how national culture influence employees' intention to violate or comply their company ISS policy. We construct and test an empirical model by using a survey data obtained from employees who are working in Ethiopia.

URLhttp://doi.acm.org/10.1145/2908446.2908456
DOI10.1145/2908446.2908456
Citation Keyarage_integrated_2016