Predicting communication constructs towards determining information security policies compliance

South African Journal of Information Management

 
 
Field Value
 
Title Predicting communication constructs towards determining information security policies compliance
 
Creator Rantao, Tsholofelo Njenga, Kennedy
 
Subject Information systems; Information security information security; policies; compliance; perception theories; determinism theories.
Description Background: Ineffective communication using inappropriate channels and poor listening skills have resulted in poor compliance with information security (InfoSec) policies. Lack of compliance with InfoSec policies minimises employee proficiency whilst also exposing organisations to business risk.Objectives: This research addresses management’s concern regarding why employees do not comply with InfoSec policies and proposes that how policies are communicated is integral to compliance and that effective communication can serve to ameliorate compliance.Method: The research adopts communication theories from knowledge management, psychology and information systems to draw on important constructs which are then tested in order to identify those that can strongly predict InfoSec policy compliance. The research was quantitative and used a survey to elicit responses from a sample of 100 employees selected from 6 organisations.Results: Our findings suggest that of the 10 communication constructs used in the miscellany of perception and determinism (MPD) framework, half of these (five) constructs strongly predicated compliance, namely reasons for communication, media appropriateness, non-conflicting interpretations, feedback immediacy and personal focus. The rest of the constructs were weak predictors or could not predict compliance.Conclusion: The research advances InfoSec literature by adapting the MPD model as integral to the development, communication and importantly, compliance with InfoSec policies. The MPD model is pertinent as it aggregates theories of communication from a number of academic disciplines and underpinnings not considered before, thereby improving our understanding on how we communicate InfoSec policies for better compliance.
 
Publisher AOSIS
 
Contributor
Date 2020-10-12
 
Type info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion — —
Format text/html application/epub+zip text/xml application/pdf
Identifier 10.4102/sajim.v22i1.1211
 
Source SA Journal of Information Management; Vol 22, No 1 (2020); 10 pages 1560-683X 2078-1865
 
Language eng
 
Relation
The following web links (URLs) may trigger a file download or direct you to an alternative webpage to gain access to a publication file format of the published article:

https://sajim.co.za/index.php/sajim/article/view/1211/1775 https://sajim.co.za/index.php/sajim/article/view/1211/1774 https://sajim.co.za/index.php/sajim/article/view/1211/1776 https://sajim.co.za/index.php/sajim/article/view/1211/1773
 
Coverage — — —
Rights Copyright (c) 2020 Tsholofelo Rantao, Kennedy Njenga https://creativecommons.org/licenses/by/4.0
ADVERTISEMENT