Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
IJCATR Volume 11 Issue 3
What Triggers Violation of Information Security Policies
Sandeep Dhawan
10.7753/IJCATR1103.1004
keywords : ISP violation intention, information security policies, IS compliance, information security behavior, internal threat agent
This paper offers a framework for information security professionals to evaluate ISP and understand policy non-adherence. It explores the different types of non-adhering behaviors and the motivations behind them. It goes on to share information about the environmental/organizational climates in which non-compliant behaviors are more or less likely to occur and briefly touches on when users are more likely to commit them. Finally, it suggests a user review process as a critical part of information security policy design and implementation.
@artical{s1132022ijcatr11031004,
Title = "What Triggers Violation of Information Security Policies",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "11",
Issue ="3",
Pages ="72 - 77",
Year = "2022",
Authors ="Sandeep Dhawan"}
The behaviors that take place within an information security system have complex roots.
Compliance behaviors are influenced by factors ranging from individual emotions to organizational structure.
Users are an under-utilized data source for evaluating and refining ISP.
Empowering users can close the gap between intention and implementation.