Exploring a Grounded Theory Study on Information Security Policy Compliance

1901 Words4 Pages

Introduction
Prior research indicates that employees seldom comply with compulsory information security policies, and organizations are finding that the enforcement of information security policies among employees is a critical challenge (Herath & Rao, 2009). Organizations and researchers have traditionally focused on the use of technology to secure computer networks from security breaches (Herath & Rao, 2009; Rhee, Kim, & Ryu, 2009). Practitioners and researchers have recently realized that effective organizational information security can best be achieved through three components: people, processes, and technology (Herath & Rao, 2009).
Researchers, however, commonly consider the people component as the weakest link in the chain of security control for an organization (Bulgurcu, Cavusoglu, Benbasat, 2010; Chen, Shaw, & Yang, 2006; Rhee et al., 2009). An abundance of research, therefore, exists concerning the technical and formal controls for information security management, but there is a lack of research on the informal, behavioral aspects of information security governance (Mishra & Dhillon, 2006). A qualitative and grounded theory study is proposed, with a purposeful sample of 10 participants from a Northeast Wisconsin insurance company providing the data using semi-structured, in-depth interviews to generate a theory on solutions to reducing employee negligence and non-compliance with information security policies. The plan of this proposal is to discuss the problem statement followed by the purpose statement and research questions. Next, a section on the research method will be presented consisting of discussions on the grounded theory research design and the data collection and analysis procedures. Finally, a section...

... middle of paper ...

.... (2009). Self-efficacy in information security: Its influence on end users' information security practice behavior. Computers and Security, 28(8), 1-11.

Shannak, R.O., Aldhmour, F. (2009). Grounded theory as a methodology for theory generation in information systems research. European Journal of Economics, Finance and Administrative Sciences, 15, 32-50.

Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487-502.

Stanton, J.M., Stam, K.R., Mastrangelo, P., & Jolton, J. (2004). Analysis of end user security behaviors. Computers and Security, 24(2), 1-10.

Urquhart, C., Lehmann, H., & Myers, M.D. (2010). Putting the ‘theory’ back into grounded theory: Guidelines for grounded theory studies in information systems. Information Systems Journal, 20(4), 357-381.

Open Document