Browse > Article

An Analysis of Compliance with Information Security Policy Effects on Information Security Ability and Behavior : Focused on Workers of Shipping and Port Organization  

Kang, Dayeon (한국해양대학교 대학원 해운경영학과)
Chang, Myunghee (한국해양대학교 해운경영학부)
Publication Information
Journal of Korea Port Economic Association / v.30, no.1, 2014 , pp. 97-118 More about this Journal
Abstract
Recent accidents of customer information leakage increase the necessity of information security for organization and the importance of information security team for it. To strengthen information security, organizations make information security policy and ask the members to comply with it. In this regard, maritime organization also needs to structure information security policy and examine its ability and behavior. The purpose of this study is to analyze the effects of compliance with information security policy on the ability and behavior of workers in shipping and port organization. The results of investigation show that information security education and norm affect compliance with information security of the workers. On the contrary, the punishment of information security is insignificant. It is shown that the degree of compliance with information security significantly affects its ability and behavior of the workers in shipping and port organization.
Keywords
Shipping and Port Organization; Information Leakage; Compliance with Information Security Policy; Information Security Ability; Information Security Behavior;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 보안뉴스, 개인정보유출 막는 '긴급7대보안수칙' 발표, 2012, 2. 20.
2 안중호.박준형.성기문.이재홍, "처벌과 윤리 교육 이정보 보안 준수에 미치는 영향: 조직유형의 조절효과를 중심으로",Information Systems Review, 제2권 제호 2010, pp.23-42.
3 윤한성, "정보보안 및 정보시스템자산 관리를 위한 내부 감시, 통제시스템", Information Systems Review, 제9권, 제1호, 2007, 121-137.
4 이선중.이미정, "정보보호문화의 평가지표에 관한 탐색적 연구", 정보화정책, 제15권 제3호, 2008, 100-119.
5 임채호, "효과적인 정보보호인식제고 방안", 정보보호학회지, 제16권 제2호, 2006, 30-36.
6 Bandura, A., Self-Efficacy: The Exercise of Control. New York: W. H. Freeman, 1977.
7 Lee, S. M., Lee, S. G. and Yoo, S., "An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories," Information and Management, Vol.41, No.6, 2004, 707-718.   DOI   ScienceOn
8 Nosworthy, J., "Implementing Information Security in the 21 super(st) Century-do You have the Balancing Factors?," Computer and Security, Vol.19, No.4, 2000, 337-347.   DOI   ScienceOn
9 Pahnila S., Siponen, M., Mahmood, A., "Employees' Behavior towards IS Security Policy Compliance," Proceedings of the 40th Annual Hawaii International Conference on System Sciences, January 03-06, 2007, p.156.
10 Piquero, N. L., Tibbetts, S. G. and Blankenship, M. B., "Examining the Role of Differential Association and Techniques of Neutralization in Explaining Corporate Crime," Deviant Behavior, Vol.26, No.2, 2005, 159-188.   DOI   ScienceOn
11 Rogers, E. M., Diffusion of Innovations. 3rd ed., New York: The Free Press. 1983.
12 Solms, B., "Information Security-A Multidimensional Discipline," Computer and Security, Vol.20, No.6, 2001, 504-508   DOI   ScienceOn
13 Straub, D. and Welke, R., "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly, Vol.22, No.4, 1998, 441-469.   DOI   ScienceOn
14 Siponen and Vance. M., "A Conceptual Foundation for Organization Information Security Awareness, Information," Management and Computer Security, Vol.8, No.1, 2000, 31-41.
15 Theoharidou, M., Kokolakis, S., Karyda, M., and Kiountouzis, E., "The Insider Threat to Information Systems and The Effectiveness of ISO17799," Computers and Security, Vol.24, 2005, 472-484.   DOI   ScienceOn
16 Workman, M., and Gathegi, J., "Punishment and Ethics Deterrents: A Study of Insider Security Contravention," Journal of the American Society for Information Science and Technology, Vol.58, No.2, 2006, 212-222.
17 Goodhue, D. and Straub, D., "Security Concerns of System User: A Study of Perceptions of the Adequacy of Security," Information and Management, Vol.20, No.1, 1991, 13-27.   DOI   ScienceOn
18 Chen, C., Medlin, B. and Shaw, R., "A Cross-Cultural Investigation of Situational Information Security Awareness Programs," Information Management and Computer Security, Vol.16, No4, 2008, 360-376.   DOI   ScienceOn
19 Choi, N., Kim, D., and Whitmore, A., "Knowing is Doing," Information Management and Computer Security, Vol.16, No.5, 2008, 484-501.   DOI   ScienceOn
20 Gist, M. E., "Self-efficacy: Implications for Organizational Behavior and Human Resource Management," Academy of Management Review, Vol.12, 1987, 472-485.
21 Halibozek, E., and Kovacich, G., "Mergers and Acquisitions Security: Corporate Restructuring and Security Management," Burlington MA: Elsevier Butterworth-Heinemann, 2005. 57.
22 Bulgurcu, B., Cavusoglu, H. and Benbasat I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol.34, No.3, 2010, 523-548.   DOI
23 Hecker, J. Z., "Port Security: Nation Faces Formidable Challenges in Marking New Initiatives Successful", U. S. General Accounting Office, August 1, 2002 ; Harrald, J. R., et al., "A Framework for Sustainable Port Security," Journal of Homeland Security and Emergency Management, Vol.1, No.2, 2004, 1-13.
24 Knapp, K., Marshall, T., Rainer, R., and Ford, F., "Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness. White Paper," Information Systems Security Certification Consortium (ISC), Vol.2. 2005.
25 Kurland, N., "Ethical Intentions and the Theories of Reasoned Action and Planned Behavior1," Journal of Applied Social Psychology , Vol.25, No.4, 2006, 297-313.
26 Cavusoglu, H. and Son, J., Information Security Control Resources in Organization: A Multidimensional View and Their Key Drivers, 2009.
27 Layton, T., Information Security Awareness: The Psychology Behind the Technology, Author House. 2005.
28 Lebow, R. and Stein, J., "Deterrence: The Elusive Dependent Variable," World Politics: A Quarterly Journal of International Relations, Vol.42, No.3, 1990, pp. 336-369.   DOI
29 강다연.장명희, "해운항만조직 구성원들의 정보보안정책 준수에 영향을 미치는 요인", 한국항만경제학회지, 제28권 제1호, 2012, 1-23.
30 강재영, "항만물류보안관리 시스템의 체계화와 일원화 방안", 법과 정책연구, 제13권 제2호, 2013, 389-436.
31 구태언, "기업의 순환계 IT System과 정보보안의 중요 이슈", DIGIECO Focus, 2011.
32 노순동, "기업체의 효율적인 보안관리 모델",산업보안논총, 창간호, 2004, 79-101.
33 문현정, "우리나라 중소기업의 정보 보호 역량 강화를 위한 교육 훈련 현황과 문제점", 정보보호학회지, 제19권 제1호, 2009, 29-39.
34 백민정.송승희 "조직의 정보윤리실천이 구성원의 정보보안인식과 행동에 미치는 영향에 관한 연구", 경상논총, 제28권 제4호 2010, 119-145.
35 보안뉴스, 카드사 개인정보 유출사고 문제점 5가지, 2014. 2. 21.
36 Berejikian, J., "A Cognitive Theory of Deterrence," Journal of Peace Research, Vol.39, 2002, 165-183.   DOI   ScienceOn