SECURITY POLICY COMPLIANCE IN PUBLIC INSTITUTIONS: AN INTEGRATIVE APPROACH

The success of organizational information security policies depends on employee’s continuous compliance from the time when it was first introduced into the organization. Hence, the purpose of this study is to investigate continuous compliance with information security policy among public organizatio...

Full description

Saved in:
Bibliographic Details
Published inJournal of Applied Structural Equation Modelling Vol. 2; no. 1; pp. 13 - 28
Main Authors Koloseni, Daniel, Lee, Chong Yee, Lee, Gan Ming
Format Journal Article
LanguageEnglish
Published Sarawak Research Society (SRS) 01.01.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The success of organizational information security policies depends on employee’s continuous compliance from the time when it was first introduced into the organization. Hence, the purpose of this study is to investigate continuous compliance with information security policy among public organizations. Data were collected from 265 employees working in Tanzania public organizations. Data analysis employed a Structural Equation Modelling (SEM) approach. The study found that the effects of organizational commitment, perceived susceptibility and perceived severity have a positive influence on employee’s continuance intention to comply with security policies, while perceived barriers have a negative influence. Moreover, the effects of perceived benefits, self-efficacy, cues and information security awareness have no significant influence. Based on these findings, recommendations were given. There is a paucity of empirical research which investigates key issues that may influence information security policy continuous compliance in organizations. This study addresses this research gap, by integrating the Health Belief Model (HBM) with employee’s organizational commitment and information security awareness constructs to investigate information security policy continuance compliance in organizations.
AbstractList The success of organizational information security policies depends on employee’s continuous compliance from the time when it was first introduced into the organization. Hence, the purpose of this study is to investigate continuous compliance with information security policy among public organizations. Data were collected from 265 employees working in Tanzania public organizations. Data analysis employed a Structural Equation Modelling (SEM) approach. The study found that the effects of organizational commitment, perceived susceptibility and perceived severity have a positive influence on employee’s continuance intention to comply with security policies, while perceived barriers have a negative influence. Moreover, the effects of perceived benefits, self-efficacy, cues and information security awareness have no significant influence. Based on these findings, recommendations were given. There is a paucity of empirical research which investigates key issues that may influence information security policy continuous compliance in organizations. This study addresses this research gap, by integrating the Health Belief Model (HBM) with employee’s organizational commitment and information security awareness constructs to investigate information security policy continuance compliance in organizations.
Author Koloseni, Daniel
Lee, Gan Ming
Lee, Chong Yee
Author_xml – sequence: 1
  givenname: Daniel
  surname: Koloseni
  fullname: Koloseni, Daniel
  organization: Faculty of Business and Finance, Universiti Tunku Abdul Rahman, Malaysia
– sequence: 2
  givenname: Chong Yee
  surname: Lee
  fullname: Lee, Chong Yee
  organization: Faculty of Business and Finance, Universiti Tunku Abdul Rahman, Malaysia
– sequence: 3
  givenname: Gan Ming
  surname: Lee
  fullname: Lee, Gan Ming
  organization: Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Malaysia
BookMark eNpNkD1Pg0AAhi-mJtba0Z1RB-p9cQduSLC9hgIpYNLpctyHaVOLARf_vViNcXqfPMMzvNdgcupOFoBbBBeUY0Ye1nGVbhb4Dt1DcgGmOIigTzFGk398BebDcIAQ4pAHIYZTsK7SpNmKeueVRSaSnZcUmzITcZ6knsi9snka7UhVLeqmFkVePXpxPoo6XW7jWrykXlyW2yJOVjfg0qnjYOe_OwPNc1onKz8rliKJM19jRIjPW0WUZYTSiHCEUBCZ0DoKLY1a5JB21mntNNOOGaycgtyokARYtUwbAzGZAfHTNZ06yPd-_6b6T9mpvTyLrn-Vqv_Y66OVxmDLLOOmbQlFliqLxpqjkeEOtuF3y_9p6b4bht66vx6C8vyrPP8qsUQSEvIFHPRnCA
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.47263/JASEM.2(1)03
DatabaseName CrossRef
DOAJ Open Access Full Text
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Open Access Full Text
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
EISSN 2590-4221
EndPage 28
ExternalDocumentID oai_doaj_org_article_dd2e6e67dbb341e4ae17daf49d7f0b82
10_47263_JASEM_2_1_03
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
M~E
ID FETCH-LOGICAL-c2133-7ba3ae634493711159d8ef40e49b1f1cfefccfc6cf6d2afa07da8352ab6cdd023
IEDL.DBID DOA
ISSN 2590-4221
IngestDate Wed Aug 27 01:31:29 EDT 2025
Tue Jul 01 04:11:34 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2133-7ba3ae634493711159d8ef40e49b1f1cfefccfc6cf6d2afa07da8352ab6cdd023
OpenAccessLink https://doaj.org/article/dd2e6e67dbb341e4ae17daf49d7f0b82
PageCount 16
ParticipantIDs doaj_primary_oai_doaj_org_article_dd2e6e67dbb341e4ae17daf49d7f0b82
crossref_primary_10_47263_JASEM_2_1_03
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-01-01
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 2018-01-01
  day: 01
PublicationDecade 2010
PublicationTitle Journal of Applied Structural Equation Modelling
PublicationYear 2018
Publisher Sarawak Research Society (SRS)
Publisher_xml – name: Sarawak Research Society (SRS)
SSID ssj0002875820
Score 2.014678
Snippet The success of organizational information security policies depends on employee’s continuous compliance from the time when it was first introduced into the...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 13
SubjectTerms public institutions
security policy compliance
Title SECURITY POLICY COMPLIANCE IN PUBLIC INSTITUTIONS: AN INTEGRATIVE APPROACH
URI https://doaj.org/article/dd2e6e67dbb341e4ae17daf49d7f0b82
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELYQEwyIpygveUAIhtDEdZyaLUQpbUUf6gO1U-THeWAoCMr_55y0VTcWtsiKIuu7yPd9J993hNxKlYBG-R-A9aWbqOkCJf3U1JhpE0mQQvkG515ftKe8O4tnW6O-_J2wyh64Aq5uLQMBIrFa44ELXEGUWOW4tIkLdbM8fTHnbYmp97JkhDyYhZWpJk-YaNS76TjvPbL76GE9IGuVhLa8-suk0jokBys2SNNqF0dkBxbHZL-3sVL9PiHdcZ5NR53JnA4Hr51sTrNBb4gCvJ_ltNOnVTMwPo0nncm07Al-ommfeqvbF1-AestpOhyOBmnWPiXTVj7J2sFqAEJgGGrHINGqoUA0OPeudcjdpG2C4yFwqSMXGQfOGGeEccIy5VSIyHhGpbQw1mI2PiO7i48FnBPqkAeFTsgI1zmqQi2sAh1LZSCGULMauVsjUnxWPhcF6oMSuqKErmBFVISNGnn2eG1e8vbU5QIGrVgFrfgraBf_8ZFLsofspVnVQ67I7vLrB66RISz1Tfkz_AKEXbWN
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SECURITY+POLICY+COMPLIANCE+IN+PUBLIC+INSTITUTIONS%3A+AN+INTEGRATIVE+APPROACH&rft.jtitle=Journal+of+Applied+Structural+Equation+Modelling&rft.au=Daniel+Koloseni&rft.au=Chong+Yee+Lee&rft.au=Gan+Ming+Lee&rft.date=2018-01-01&rft.pub=Sarawak+Research+Society+%28SRS%29&rft.eissn=2590-4221&rft.volume=2&rft.issue=1&rft.spage=13&rft.epage=28&rft_id=info:doi/10.47263%2FJASEM.2%281%2903&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_dd2e6e67dbb341e4ae17daf49d7f0b82
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2590-4221&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2590-4221&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2590-4221&client=summon