Browse > Article
http://dx.doi.org/10.14400/JDC.2018.16.2.117

A Study on the Influence of Organizational Information Security Goal Setting and Justice on Security Policy Compliance Intention  

Hwang, In-Ho (School of Knowledge-Based Management, Chung-Ang University)
Kim, Seung-Wook (Department of Business Administration, Pyeong-Taek University)
Publication Information
Journal of Digital Convergence / v.16, no.2, 2018 , pp. 117-126 More about this Journal
Abstract
The threat to information security is growing globally. To this, organizations are increasing the weight of adapting and operating the more specialized information security policy and system. Information security requires participation from the employees who execute the security system and policy, and to increase the level of organization's internal security, requires organization's systematic support to improve employees' information security compliance intention. This research finds the mechanism for improving employee's information security compliance intention by applying justice theory and goal setting theory in information security. We use structural equation modeling to verify the research hypothesis, and conducted a survey on the employees of organization with information security policy. In other words, this research performs verification of the research model based hypothesis which claims that security policy goal setting has positive influence on employee's level of security related justice recognition, and claims that justice has positive influence on compliance intention. The object of study is the employees of the organization that adapts information security policy, and 383 valid samples were collected via survey. Structural equation modeling was performed to verify the research hypothesis. The result shows that security policy goal factor (goal difficulty, goal specificity) improves employee's security related justice recognition, and that security related justice (distribution, process, and information justice) has positive influence on compliance intention. The result suggests the strategic approach directions for improving employees' compliance intention on organization's security policy.
Keywords
Information Security Policy Compliance Intention; Distribution Justice; Procedural Justice; Informational Justice; Security Goal Setting;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 T. Herath & H. R. Rao. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, Decision Support Systems, 47(2), 154-165.   DOI
2 B. Bulgurcu, H. Cavusoglu & I. Benbasat. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, 34(3), 523-548.   DOI
3 M. Siponen, S. Pahnila & M. A. Mahmood. (2010). Compliance with information security policies: An empirical investigation. Computer, 43(2), 64-71.   DOI
4 Q. Hu, Z. Xu, T. Dinev & H. Ling. (2011). Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, 54(6), 54-60.   DOI
5 Y. Chen, K. Ramamurthy & K. W. Wen. (2012). Organizations' information security policy compliance: Stick or carrot approach?, Journal of Management Information Systems, 29(3), 157-188.   DOI
6 C. Park & M. Yim. (2012). An understanding of impact of security countermeasures on persistent policy compliance. Journal of Digital Convergence, 10(4), 23-35.   DOI
7 A. Vance, M. Siponen & S. Pahnila. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, 49(3), 190-198.   DOI
8 Z. Ouyang, J. Sang, P. Li, P & J. Peng. (2015). Organizational justice and job insecurity as mediators of the effect of emotional intelligence on job satisfaction: A study from China. Personality and Individual Differences, 76, 147-152.   DOI
9 C. B. Meyer. (2001). Allocation processes in mergers and acquisitions: An organizational justice perspective. British Journal of Management, 12(1), 47-66.   DOI
10 S. W. Hystad, K. J. Mearns & J. Eid. (2014). Moral disengagement as a mechanism between perceptions of organisational injustice and deviant work behaviours. Safety Science, 68, 138-145.   DOI
11 J. Y. Son & J. Park. (2016). Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns. International Journal of Information Management, 36(3), 309-321.   DOI
12 H. Zhang & N. C. Agarwal. (2009). The mediating roles of organizational justice on the relationships between HR practices and workplace outcomes: an investigation in China. The International Journal of Human Resource Management, 20(3), 676-693.   DOI
13 E. A. Locke & G. P. Latham. (2006). New directions in goal-setting theory. Current Directions in Psychological Science, 15(5), 265-268.   DOI
14 E. A. Locke & G. P. Latham (2002). Building a practically useful theory of goal setting and task motivation: A 35-year odyssey. American Psychologist, 57(9), 705-717.   DOI
15 B. E. Wright & B. S. Davis. (2003). Job satisfaction in the public sector: The role of the work environment. The American Review of Public Administration, 33(1), 70-90.   DOI
16 J. A. Colquitt. (2001). On the dimensionality of organizational justice: a construct validation of a measure. Journal of Applied Psychology, 86(3), 386-400.   DOI
17 L. J. Williams & S. E. Anderson. (1994). An alternative approach to method effects by using latent-variable models: Applications in organizational behavior research. Journal of Applied Psychology, 79(3), 323-331.   DOI
18 I. Hwang & Y. Lee. (2016). The employee's information security policy compliance intention: Theory of planned behavior, goal setting theory, and deterrence theory applied, Journal of Digital Convergence, 14(7), 155-166.   DOI
19 R. H. Moorman. (1991). Relationship between organizational justice and organizational citizenship behaviors: Do fairness perceptions influence employee citizenship?, Journal of Applied Psychology, 76(6), 845-855.   DOI
20 B. E. Wright. (2004). The role of work context in work motivation: A public sector application of goal and social cognitive theories. Journal of Public Administration Research and Theory, 14(1), 59-78.   DOI
21 M. T. Tsai & N. C. Cheng. (2012). Understanding knowledge sharing between IT professionals-an integration of social cognitive and social exchange theory. Behaviour & Information Technology, 31(11), 1069-1080.   DOI
22 A. Vance, M. Siponen & S. Pahnila. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, 49(3), 190-198.   DOI
23 Y. Zhang, J. A. LePine, B. R. Buckman & F. Wei. (2014). It's not fair… or is it? The role of justice and leadership in explaining work stressor-job performance relationships. Academy of Management Journal, 57(3), 675-697.   DOI
24 R. West. (2008). The psychology of security. Communications of the ACM, 51(4), 34-40.   DOI
25 M. S. Yim. (2012). A path way to increase the intention to comply with information security policy of employees. Journal of Digital Convergence, 10(10), 119-128.   DOI
26 P. M. Muchinsky. (2006). Psychology applied to work: An introduction to industrial and organizational psychology. Cengage Learning.
27 P. E. Spector. (2009). Industrial and organizational psychology. Research and. Practice.
28 T. A. Judge & J. A. Colquitt. (2004). Organizational justice and stress: the mediating role of work-family conflict. Journal of Applied Psychology, 89(3), 395-404.   DOI
29 H. Li, R. Sarathy, J. Zhang & X. Luo. (2014). Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Information Systems Journal, 24(6), 479-502.   DOI
30 J. M. Diefendorff & G. A. Seaton, G. A. (2015). Work motivation. International encyclopedia of the social & behavioral sciences, 2nd edn. Elsevier, Oxford, pp.680-686.
31 C. C. Pinder. (1998). Work motivation in organizational behavior, Upper Saddle River, NJ: Prentice Hall.
32 I. Hwang, D. Kim, T. Kim & S. Kim. (2017). Why not comply with information security? An empirical approach for the causes of non-compliance, Online Information Review, 41(1), 1-17.
33 Verizon. (2017). 2017 data breach investigations report.
34 I. Hwang & D. Kim. (2016). The effect of organizational information security environment on the compliance intention of employee, The Journal of Information Systems, 25(2), 51-77.   DOI
35 D. Kim, I. Hwang & J. Kim. (2016). A study on employee's compliance behavior towards information security policy: A modified triandis model, Journal of Digital Convergence, 14(4), 209-220.   DOI
36 J. D'Arcy, A. Hovav & D. Galletta. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, Information Systems Research, 20(1), 79-98.   DOI
37 IDC. (2016). Worldwide semiannual security spending guide.
38 K. D. Loch, H. H. Carr & M. E. Warkentin. (1992). Threats to information systems: today's reality, yesterday's understanding, MIS Quarterly, 16(2), 173-186.   DOI
39 A. B. Ruighaver, S. B. Maynard & S. Chang. (2007). Organisational security culture: Extending the end-user perspective. Computers & Security, 26(1), 56-62.   DOI
40 E. A. Locke & G. P. Latham. (1990). Work motivation and satisfaction: Light at the end of the tunnel. Psychological Science, 1(4), 240-246.   DOI
41 I. Koskosas. (2008). Goal setting and trust in a security management context. Information Security Journal: A Global Perspective, 17(3), 151-161.   DOI
42 A. Li & A. B. Butler. (2004). The effects of participation in goal setting and goal rationales on goal commitment: An exploration of justice mediators. Journal of Business and Psychology, 19(1), 37-51.   DOI
43 Y. Chen, K. Ramamurthy, & K. W. Wen. (2012). Organizations' information security policy compliance: Stick or carrot approach?. Journal of Management Information Systems, 29(3), 157-188.   DOI
44 J. C. Nunnally. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
45 B. H. Wixom & H. J. Watson. (2001). An empirical investigation of the factors affecting data warehousing success. MIS Quarterly, 25(1), 17-41.   DOI
46 C. Fornell & D. F. Larcker. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.   DOI
47 P. M. Podsakoff, S. B. MacKenzie, J. Y. Lee & N. P. Podsakoff. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.   DOI