Browse > Article
http://dx.doi.org/10.14400/JDC.2021.19.2.105

Analysis of Differences in Information Security Compliance according to Individual Coping and Organizational Homogeneity Culture  

Hwang, In-ho (Department of General Education, Kookmin University)
Publication Information
Journal of Digital Convergence / v.19, no.2, 2021 , pp. 105-115 More about this Journal
Abstract
The purpose of this study is to present the effect of differences in individual coping and organizational homogeneity culture on information security compliance from an exploratory perspective. The study divided groups into individual coping (task-oriented, emotion-oriented) and organizational homogeneity culture (homogeneity, heterogeneity), confirms the difference in information security for each group through cross-design and presents a multiple mediation model between information security factors. As a result of the study, in the coping dimension, the average of the security compliance factors was higher in the emotion-oriented than the task-oriented, and in the homogeneity culture dimension, the average of the security compliance factors was higher in the homogeneity than the heterogeneity. Additionally, social influence and involvement had a multiple mediation effect on the relationship between information security awareness and compliance intention. The implications of this study were to confirm the difference in the effect of individual decision-making styles on security compliance according to the organizational culture differences. The results suggest the necessity of applying a customized information security compliance model for each organization and individual characteristics.
Keywords
Coping; Homogeneity Culture; Information Security Awareness; Social Influence; Security Involvement; Compliance Intention;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Podsakoff, S. MacKenzie, J. Lee, and N. Podsakoff. (2003). Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies, Journal of Applied Psychology, 88(5), 879-903.   DOI
2 I. Hwang & S. Kim. (2018). A Study on the Influence of Organizational Information Security Goal Setting and Justice on Security Policy Compliance Intention. Journal of Digital Convergence. 16(2), 117-126. DOI : 10.14400/JDC.2018.16.2.117.   DOI
3 B. Bulgurcu, H. Cavusoglu & I. Benbasat. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness. MIS Quarterly, 34(3), 523-548.   DOI
4 A. C. Johnston & M. Warkentin. (2010). Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly, 34(3), 549-566, 2010. DOI : 10.2307/25750691   DOI
5 J. D'Arcy, T. Herath & M. K. Shoss. (2014). Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems, 31(2), 285-318. DOI : 10.2753/MIS0742-1222310210.   DOI
6 P. S. Galluch, V. Grover & J. B. Thatcher. (2015). Interrupting the Workplace: Examining Stressors in an Information Technology Context. Journal of the Association for Information Systems, 16(1), 1-47. DOI : 10.17705/1jais.00387.   DOI
7 Q. Hu, T. Dinev, P. Hart & D. Cooke. (2012). Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture. Decision Sciences, 43(4), 615-660. DOI : 10.1111/j.1540-5915.2012.00361.x.   DOI
8 K. M. Carley. (1995). Communication Technologies and their Effect on Cultural Homogeneity, Consensus, and the Diffusion of New Ideas. Sociological Perspectives, 38(4), 547-571. DOI: 10.2307/1389272.   DOI
9 J. Chae & J. Lee. (2004). North Korea-South Korea Cultural Heterogeneity in Psychological Perspective: Focusing on the North Korean Defectors' Adaptation. Korean Journal of Psychological and Social Issues, 19(2), 79-101.
10 A. McCormac, T. Zwaans, K. Parsons, D. Calic, M. Butavicius & M. Pattinson. (2017). Individual differences and Information Security Awareness. Computers in Human Behavior, 69, 151-156. DOI : 10.1016/j.chb.2016.11.065.   DOI
11 W. R. Flores & M. Ekstedt. (2016). Shaping Intention to Resist Social Engineering through Transformational Leadership, Information Security Culture and Awareness. Computers & Security, 59, 26-44. DOI : 10.1016/j.cose.2016.01.004.   DOI
12 Security Type, By Solution, By Service, By Deployment, By Organization, By Application, By Region, And Segment Forecasts, 2020 - 2027.
13 Verizon. (2012). 2012 data breach investigations report.
14 P. Ifinedo. (2012). Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security, 31(1), 83-95. DOI : 10.1016/j.cose.2011.10.007.   DOI
15 N. S. Safa, C. Maple, S. Furnell, M. A. Azad, C. Perera, M. Dabbagh & M. Sookhak. (2019). Deterrence and Prevention-based Model to Mitigate Information Security insider Threats in Organisations. Future Generation Computer Systems, 97, 587-597. 10.1016/j.future.2019.03.024   DOI
16 J. E. Higgins & N. S. Endler. (1995). Coping, Life Stress, and Psychological and Somatic Distress. European Journal of Personality, 9(4), 253-270. DOI : 10.1002/per.2410090403   DOI
17 I. Hwang & H. Lee. (2016). The Employee's Information Security Policy Compliance Intention: Theory of Planned Behavior, Goal Setting Theory, and Deterrence theory Applied. Journal of Digital Convergence, 14(7), 155-166, DOI : 10.14400/JDC.2016.14.7.155.   DOI
18 E. H. Park, J. Kim & Y. S. Park. (2017). The Role of Information Security Learning and Individual Factors in Disclosing Patients' Health Information, Computers & Security, 65, 64-76. DOI :10.1016/j.cose.2016.10.011.   DOI
19 H. Jang & S. Kim (2018), The Effects of Maladaptive Perfectionism and Stress Coping on Chronic Fatigue of Adolescent Athletes through Convergence. Journal of Digital Convergence, 16(1), 371-379.   DOI
20 S. Folkman & R. S. Lazarus. (1985). If It Changes It Must Be a Process: Study of Emotion and Coping during Three Stages of a College Examination. Journal of Personality and Social Psychology, 48(1), 150-170.   DOI
21 H. H. Chang & S. S. Chuang. (2011), Social Capital and Individual Motivations on Knowledge Sharing: Participant Involvement as a Moderator, Information & Management, 48(1), 9-18. DOI : 10.1016/j.im.2010.11.001.   DOI
22 M. Tarafdar, Q. Tu, B. S. Ragu-Nathan & T. S. Ragu-Nathan. (2007). The Impact of Technostress on Role Stress and Productivity. Journal of Management Information Systems, 24(1), 301-328. DOI : 10.2753/MIS0742-1222240109.   DOI
23 R. West. (2008). The Psychology of Security. Communications of the ACM, 51(4), 34-40. DOI : 10.1145/1330311.1330320.   DOI
24 I. Hwang & S. Hu. (2018). A Study on the Influence of Information Security Compliance Intention of Employee: Theory of Planned Behavior, Justice Theory, and Motivation Theory Applied. Journal of Digital Convergence, 16(3), 225-236. DOI : 10.14400/JDC.2018.16.3.225.   DOI
25 N. S. Safa, C. Maple, T. Watson & R. Von Solms. (2018). Motivation and Opportunity based Model to Reduce Information Security insider Threats in Organisations. Journal of Information Security and Applications, 40, 247-257. DOI : 10.1016/j.jisa.2017.11.001.   DOI
26 J. C. Nunnally. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.