Case studies

APA FORMAT 

500 – 600 WORDS PER TASK

Don't use plagiarized sources. Get Your Custom Essay on
Case studies
Just from $13/Page
Order Essay

5 – 6 References per task.

Provide me with separate word documents separately for the 2 tasks.

Mini Case

Innovation at International Foods2

Josh Novak gazed up at the gleaming glass-and-chrome skyscraper as he stepped out of the cab. “Wow!” he thought to himself. “I’ve hit the big time now.” The International Foods Group (IFG) Tower was a Chicago landmark as well as part of the company’s logo, which appeared on the packages of almost every type of food one could imagine— breakfast cereals, soft drinks, frozen pizza, cheese, and snack foods, to name just a few. Walking into the tower’s marble lobby, Josh could see displays of the company’s packaging from its earliest days, when its dairy products were delivered by horse and wagon, right up to the modern global entity it had become.

After signing in with security, Josh was whisked away to the 37th floor by an efficient

attendant who walked him down a long hall of cubicles to a corner office

overlooking Lake Michigan. On the way, Josh passed display photos of the company’s

founder, old Jonas Wilton looking patriarchal, and several of the family scions, who

had grown the company into a major national brand before the IPO in the 1980s had

made IFG a public company. Josh, having “Googled” the company’s history last night in

response to this summons, knew that IFG was now the largest purveyor of food products

the world had ever known. While many decried the globalization of the food business,

IFG kept right on growing, gobbling up dozens of companies each year—some because

IFG wanted to stomp on its competition and others because it wanted their good ideas.

Josh’s own small company, Glow-Foods, a relative newcomer in the business, was

fortunately one of the latter, but Josh was a little puzzled about this command performance.

After all, he himself wasn’t anyone important. The owners of the company

all received multiple millions and were sticking around—as per contract—during the

transition. The next level, including Josh’s boss, had mostly jumped ship as soon as the

“merger” was announced. “This isn’t my thing,” drawled Nate Greenly over beer one

night at the local pub. “Corporate America isn’t going to let us stay as we are, no matter

what they say. Get out while you can,” he advised. But Josh, with a freshly minted

MBA in his pocket, thought differently. And so here he was, walking into the CIO’s

office hundreds of miles away from the cramped loft in Toronto where Glow-Foods was

headquartered.

As the office door swung open, two people dressed in “power suits” turned to

meet him. “Uh oh, I’m not in Kansas anymore,” thought Josh as he mentally reviewed

his outfit of neatly pressed khakis and golf shirt, which was a big step up from his

usual attire of jeans and a T-shirt. A tall man with silver hair stepped forward with his

hand held out. “You must be Josh,” he boomed. “Welcome. I’m John Ahern, and this is

my associate, Tonya James, manager of IT

marketing

. Thanks for coming today. Please,

have a seat.” Josh complied, slinging his backpack over the corner of the leather chair while taking in the rich furnishings of the office and the panoramic view. After a bit of

chitchat about the weather and the prospects of their respective baseball teams, John

pulled out a black leather folder.

“Well, we won’t keep you in suspense anymore, Josh. As you know, when we took

over Glow-Foods we decided to completely align our processes, including IT. It doesn’t

make any economic sense to run separate data centers and applications, so we already

have a team in place to transfer all your hardware and software to our centralized corporate

systems over the next month. We’ll be replacing your Macs with PCs, and everyone

will get training on our ERP system. We’re going to keep a small team to deal with

the specifically Canadian issues, but other than that we see no need for an IT function

in Toronto any more.” Josh nodded glumly, thinking about his friends who would be

losing their jobs and all the fun they’d had during those all-nighters brainstorming new

ways to help Glow-Foods products go “viral.” Nate was right, he thought glumly. They

don’t really get us at all.

“That said,” John continued. “We are very impressed with the work you and your

team have done in using social networking, mashups, and multimedia to support your

marketing strategy. Your ability to reach the under-thirty demographic with technology

is impressive.” He turned to Tonya, who added. “Here at IFG, we have traditionally

marketed our products to women with children. We have a functional Web site—a place

where customers can find out about our products and where to buy them. More recently,

we’ve added their nutritional content, some recipes, and a place where customers can

contact us directly with questions, but it’s really unidirectional and pretty dry.”

Josh nodded in agreement with this assessment. The difference in the two companies’

approaches was night and day. Although not everything they had tried at Glow-

Foods had worked, enough of it had succeeded that demand for the company’s products

had skyrocketed. Young adults and teens had responded en masse to the opportunity

to post pictures of themselves drinking their Green Tea Shakes in unusual places on the

Glow-Foods Web site and to send a coupon for their favorite Glow-Foods product to

a friend. Serialized company mini-dramas popped up on YouTube and viewers were

asked to go online to help shape what happened to the characters—all of them using

Glow-Foods products extensively. Contests, mass collaboration in package design, and

a huge network of young part-time sales reps linked through Facebook all contributed

to making the brand hip and exciting—and drove sales through the roof.

John adjusted his French cuffs. “We want to tap into the youth and young adult

market with IT, and we think you’re the one who can help us do this. We’re going to

give you a team and whatever resources you need right here in Chicago. With our

global reach and much larger budgets, you could do great things for our company.”

John went on to outline a job offer to Josh that sent tingles down his spine. “I really

have hit the big time,” he thought as he signed the documents making him a team manager

at IFG at a salary that was almost double what he was earning now. “I can’t wait

to get started.”

Six weeks later he was being walked down the same hall by Tonya, now his

immediate boss, and into her office, a smaller version of his with a window looking

onto another high-rise. “What’s next?” he asked. “I’ve booked a meeting room for

you to meet your new team at ten-thirty,” Tonya explained. “But before that, I want to

go over a few things with you first. As the manager of IT Marketing, I am personally

thrilled that we’re going to be experimenting with new technologies and, as your coach and mentor at IFG, I’m going to make it my job to see that you have the resources and

support that you need. However, you may find that not everyone else at this company

will be as encouraging. We’re going to have some serious obstacles to overcome, both

within IT and with the larger company. It will be my responsibility to help you deal

with them over the next few months as you put your ideas together. But you need to

know that IFG may have different expectations of you than Glow-Foods. And you may

find you will get a better reception to your ideas if you look a bit more professional.”

Josh winced and nodded. He’d already ramped up the wardrobe for his first day with

a sports jacket, but clearly he needed to do more. “Finally, I’d like you to come up here

every Friday afternoon at four o’clock to go over your progress and your plans. My

schedule is usually fully booked, but if you have any questions you can always send me

an e-mail. I’m pretty good at getting back to people within twenty-four hours. Now let’s

go meet your new team. I think you’ll be happy with them.”

An hour later Josh and his new team were busy taking notes as Tonya outlined

their mandate. “You have a dual role here,” she explained. “First, I want you to work

with Ben here to develop some exciting new ideas for online marketing. We’re looking

for whatever creative ideas you have.” Ben Nokony was the team’s marketing liaison.

Any ideas would be vetted through him, and all proposals to the individual product

teams would be arranged by him. “Second, I need you to keep your eyes open and your

ears to the ground for any innovative technologies you think might work here at IFG.

These are our future, and you’re our vanguard.” Josh glanced around at his team, an

eclectic group. They seemed eager and enthusiastic, and he knew they were talented,

having had a say in choosing them. With the exception of Ben, all were new to IFG,

experienced in using a variety of new media, and under thirty years old. They were

going to do great things together, he could see.

The next couple of weeks were taken up with orientation. Ben introduced each

of the major product divisions to the team, and everybody had come back from each

meeting full of new possibilities. Tonya had also arranged for the team to meet with

the chief technology officer, Rick Visser, who was in charge of architecture, privacy and

security, risk management, and the technology roadmap. Rick had been pleasant but

cool. “Please remember that we have a process for incorporating new technology into

our architecture,” he explained as he handed over a thick manual of procedures. “In a

company our size we can’t operate without formal processes. Anything else would be

chaos.” The team had returned from that meeting full of gloom that their ideas would

all be shot down before they were even tried. Finally, they had met with the IT finance

officer. “I’m your liaison with corporate finance,” Sheema Singh stated. “You need to

work with me to develop your business cases. Nothing gets funded unless it has a business

case and is approved through our office.”

Finally, having dragged some chairs into Josh’s eighteenth-floor and marginally

larger cubicle and desk, the team got down to work. “This is ridiculous,” fumed Mandy

Sawh, shuffling her papers on her lap. “I can’t believe you need to book a conference

room two weeks in advance around here. Who knows when you need to get together?”

“Okay, team, let’s settle down and take a look at what you’ve got,” said Josh. One by

one, they outlined their preliminary ideas—some workable and some not—and together

they identified three strong possibilities for their first initiatives and two new technologies

they wanted to explore. “Great work, team,” said Josh. “We’re on our way.” The problems began to surface slowly. First, it was a polite email from Rick Visser

reminding them that access to instant messaging and Facebook required prior approval

from his group. “They want to know why we need it,” groused Veejay Mitra. “They

don’t seem to understand that this is how people work these days.” Then Ben got a bit

snippy about talking directly to the product teams. “You’re supposed to go through

me,” he told Josh’s team. “I’m the contact person, and I am supposed to be present at all

meetings.” “But these weren’t ‘meetings,’” Candis Chung objected. “We just wanted to

bounce some ideas around with them.” Next, it was a request from Sheema to outline

their proposed work, with costs and benefits, for the next fiscal year—beginning six

months from now. “Can’t we just make up a bunch of numbers?” asked Tom Webster.

“We don’t know how this stuff is going to play out. It could be great and we’ll need lots

of resources to scale up, or it could bomb and we won’t need anything.” Everywhere

the team went, they seemed to run into issues with the larger corporate environment.

Tonya was helpful when Josh complained about it at their Friday afternoon meetings,

smoothing things over with Rick, helping Josh to navigate corporate procedures, and

even dropping by to tell the team they were doing a great job.

Nevertheless, Josh could sense his own and everyone else’s frustration as they prepared

for their first big project review presentation. “They want us to be innovative, but

they keep putting us in a straight-jacket with their ‘procedures’ and their ‘proper way to

go about things,’” he sighed to himself. Thank goodness, the presentation was coming

together nicely. Although it was only to the more junior executives and, of course, John

and Rick, he had high hopes for the vision his team was developing to get IFG out and

interacting with its customers.

“And in conclusion, we believe that we can use technology to help IFG reach its

customers in three new ways,” Josh summarized after all of his team members had

presented their ideas. “First, we want the company to connect directly with customers

about new product development ideas through an interactive Web site with real-time

response from internal staff. Second, we want to reach out to different communities

and gain insights into their needs and interests, which in turn will guide our future

marketing

plans. And third, we want to implement these and other ideas on the ‘cloud,’

which will enable us to scale up or down rapidly as we need to while linking with company

databases. Any questions?”

There was a moment of stunned silence, and then the barrage began. “What’s

the business value of these initiatives?” asked Sheema. “I can’t take them upstairs to

our finance committee meeting without a clear commitment on what the benefits are

going to be.” Ben looked nonplussed. “We don’t really know,” he said. “We’ve never

really done this before, but we like the ideas.” “I’m concerned that we don’t bite off

more than we can chew,” said John thoughtfully. “What if these customers don’t like the

company or its products and say bad things about us? Do we have any procedures for

handling these types of situations?” “There’s definitely a serious risk to our reputation

here,” said Rick, “but I’m more concerned about this ‘cloud’ thing. We haven’t even got

cloud in our architecture yet, and this plan could make company intellectual property

available to everyone in cyberspace!” Sheema spoke again. “I hate to mention this, but

didn’t we do something like this community project about ten years ago? We called it

knowledge

management, and it flopped. No one knew what to do with it or how to

handle the information it generated.” On and on they went, picking holes in every part

of every idea as the team slumped lower in their seats. Finally, Tonya stood up. “I’d like to thank you all for raising some legitimate and

important concerns,” she said. “And I’d like to thank Josh and his team for some fine

work and some excellent ideas. Marketing was looking for creativity, and we have

delivered on that part of our mandate. But now we have a more important job. And that

is innovation. Innovation is about more than good ideas; it’s about delivering the best

ones to the marketplace. We’re in a new world of technology, and IT can’t be the ones

to be saying ‘no’ all the time to the business. Yes, we need to protect ourselves, and we

don’t want to throw money at every half-baked idea, but we’ve got to find a way to be

open to new ideas at the same time. We know there’s value in these new ideas—we saw

it work at Glow-Foods. That’s why Josh is here. He has a proven track record. We just

have to find a way to identify it without taking too much risk.” The room sat in stunned silence as Tonya looked from one to the other. At last,John cleared his throat. “You’re right, Tonya. We want creativity and innovation, and we need a better way to get it than we have now. I think what we need is a process for creativity and innovation that will help us overcome some of the roadblocks we

put in place.” As Josh mentally rolled his eyes at the thought of yet another process,

Tonya replied. “I think you’re partially right, John. Processes do have their place, but

we also need some space to play with new ideas before we cast them in concrete. What

I’d like to do over the next two weeks is speak with Josh and his team and each of

you and then develop a plan as to how we can, as an IT department, better support

innovation at IFG.”

Discussion Questions

1. In discussion with Josh, Tonya foreshadows “some serious obstacles to overcome.”

Describe these obstacles in detail.

2. How can Josh win support for his team’s three-point plan to use technology to help

IFG reach its customers?

Format APA

No.of words per task: 500 – 600

References: 4 – 6

Task 1 – Case study 1 – PFA word doc for full case study content

For this assignment, you are to provide a Critical Analysis of the following article . You should ensure that you are following standard APA formatting. 

Employees’ Adherence to Information Security Policies: An Empirical Study

Task 2 – case study 2 – PFA word doc for full case study content

Read the Innovation at International Foods Case Study on pages 234-238 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format.

1. In discussion with Josh, Tonya foreshadows “some serious obstacles to overcome.”

Describe these obstacles in detail.

2. How can Josh win support for his team’s three-point plan to use technology to help IFG reach its customers?

Employees’ Adherence to Information
Security Policies: An Empirical Study

Mikko Siponen’, Seppo Pahnila\ and Adam Mahmood^
1 Department of Information Processing Science, The University of Oulu,

Finland, {mikko.siponen, seppo.pahnila}@oulu.fi
2 Department of Information and Decision Sciences, University of Texas at

El Paso, mmahmood@utep.edu

Abstract. The key threat to information security is constituted by careless
employees who do not comply with information security policies. To ensure
that employees comply with organizations’ information security procedures, a
number of information security policy compliance measures have been
proposed in the past. Prior research has criticized these measures as lacking
theoretically and empirically grounded principles to ensure that employees
comply with information security policies. To fill this gap in research, this
paper advances a new model that explains employees’ adherence to
information security policies. In this model, we extend the Protection
Motivation Theory (PMT) by integrating the General Deterrence Theory
(GDT) and the Theory of Reasoned Action (TRA) with PMT. To test this
model, we collected data (N = 917) from four different companies. The results
show that threat appraisal, self-efficacy and response efficacy have a
significant impact on intention to comply with information security policies.
Sanctions have a significant impact on actual compliance with information
security policies. Intention to comply with information security policies also
has a significant impact on actual compliance with information security
policies.

1 Introduction

Up to 90% of organizations confront at least one information security incident within
any given year [5, p. 684]. To cope with the increase in information security threats,
not only technical solutions, but also information management methods and policies
have been proposed. Employees, however, seldom comply with these information
security procedures and techniques, placing the organizations’ assets and business in
danger [32, p. 125]. To address this concern, several information security compliance
approaches have been proposed. Aytes and Connolly [3], Siponen [29] and
Puhakainen [24] have criticized these extant approaches as lacking not only

Please use the following format when citing this chapter:

Siponen, M., Pahnila, S., and Mahmood, A., 2007, in IFIP International Federation for Information Processing, Volume
232, New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, H., Eloff, M., Labuschagne,
L., Eloff, J., von Solms, R., (Boston: Springer), pp. 133-144.

mailto:mmahmood@utep.edu

134 Mikko Siponen, Seppo Pahnila and Adam Mahmood

theoretically grounded methods, but also empirical evidence on their effectiveness.
In fact, only three approaches [4], [34], [35] meet these important criteria. This paper
fills this gap in research by first building a new theoretical model, explaining how
employees’ compliance with information security policies and guidelines can be
improved. In this model, we combine PMT with the modern GDT and TRA. The
model is then validated using an empirical study.

The results of this study are of relevance to researchers and practitioners. Since
the extant studies on information security policy compliance present only anecdotal
information on the factors explaining employees’ adherence to information security
policies with three exceptions mentioned above, it is of utmost importance to study
this issue. This information is also useful for practitioners who want to obtain
empirically proven information on how they can improve their employees’
adherence to information security policies, and hence improve the information
security of their organizations.

The paper is organized as follows. The second section reviews previous works.
The third section proposes the research model and the fourth discusses the research
methodology. The results are presented in the fifth section. The sixth section
discusses the implications of the study.

2 Previous work on information security policy compliance

To understand the fundamental limitations of the extant works on information
security policy compliance, these works have been divided into three categories: (1)
conceptual principles without an underlying theory and empirical evidence; (2)
theoretical models without empirical support; (3) empirical support grounded upon
theories. These categories are discussed next.

Conceptual principles present practical principles and suggestions for
improving employees’ compliance with information security polices. These studies
include generic information security awareness training programs by Sommers and
Robinson [30], McCoy and Fowler [20 p. 347], Thomson and von Solms [36],
McLean [21], Spurling [31, p. 20], and Parker [22, p. 464].

Perry [23, pp. 94-95] offers practical principles for the improvement of
information security behavior: highlighting information security violations, sending
managers to information security seminars, and getting consultants to evaluate the
information security state of the organization. Gaunt [11], Furnell, Sanders and
Warren [10] and Katsikas [16] all propose information security awareness programs
for improving information security behavior in healthcare contexts. Furnell et al. [9]
propose the use of information security training software that helps users to become
aware of potential risks and the corresponding information security countermeasures.
Finally, Wood [39] suggests 53 means for ensuring that employees comply with
information security procedures, such as information security advertisements on
coffee mugs.

While all the above propose interesting principles for increasing information
security awareness, none of them are theoretically grounded or offer empirical
evidence to support their principles in practice.

Employees’ Adherence to Information Security Policies: An Empirical Study 135

Theoretical models without empirical support contain studies that contribute
to the creation of theoretical insights on how employees’ information security policy
compliance can be increased. Aytes and Connolly’s [3] study suggests that the
perceived probability and desirability of the outcomes of the individuals’ choices
explains users’ security behavior. Lee and Lee [17] use the social bonds theory, the
theory of planned behavior, the social learning theory, and GDT to explain computer
crimes, while Siponen [29] suggests the use of the theory of planned behavior, the
theory of intrinsic motivation, and need-based theories to ensure that employees
follow information security policies and guidelines. Thomson and von Solms [37]
suggest the use of social psychology to improve employees’ information security
behavior.

To summarize, while these works contribute to the creation of theoretical insights
on how employees’ information security compliance can be increased, they are
lacking empirical evidence on their practical usefulness.

Empirical works grounded upon theories include Aytes and Connolly [4],
Straub [34], Straub and Welke [35] and Woon et al. [40]. Aytes and Connolly [4] use
the Rational Choice Model to explain why workers violate information security
procedures. Straub [34] and Straub and Welke [35] use the GDT to investigate
whether investment in information security measures reduces computer abuse.
Weekly hours dedicated to information security, dissemination of information
security polices and guidelines, stating penahies for non-compliance, and the use of
information security software were found to be most effective deterrents [34, p. 272-
273]. Finally, Woon et al. [40] found that the perceived severity of the information
security threat, effectiveness of response, perceived capability to use the security
features (self-efficacy) and the cost of using the security features (response cost)
affect home users’ decisions on whether or not to use security features.

To summarize the literature review, while several information security
awareness, education and enforcement approaches exist, only four approaches are
theoretically and empirically grounded. Of these three, Woon et al. [40] study
wireless network users, while Straub [34] and Straub and Welke [35] focus on
classical deterrence theory, and Aytes and Connolly [4] apply the Rational Choice
Model. Thus, excluding Straub [34], Straub and Welke [35], and Aytes and Connolly
[4], the prior approaches do not offer an exploratory model or evidence of what
factors affect employees’ information security policy compliance. This study aims to
fill this gap.

3 The research model

The theoretical model combines PMT, TRA and GDT. PMT is best known for its use
in health science: it has been used to motivate people to avoid unhealthy behavior.
PMT is divided into two components: threat appraisal and coping appraisal. The
former is ftirther divided into threat and coping appraisal, while the latter consists of
self-efficacy, response efficacy and response costs. PMT emphasizes the changes
produced by persuasive communications [27]. Persuasive communications is based
on interacting, aiming to alter the way people think, feel or behave. Thus, the goal of

136 Mikko Siponen, Seppo Pahnila and Adam Mahmood

persuasion is to motivate or to influence an individual’s attitude or behavior in a
predetermined way.

‘Intention to comply with information security policies’ and ‘actual compliance
with information security policies’ are based on TRA [8]. Attitude indicates a
person’s positive or negative feelings toward some stimulus object [2]. According to
Ajzen [2], ‘intentions’ captures the motivational factors that influence a behavior,
and they indicate how hard people are willing to try to perform the behavior in
question. According to TRA, the stronger the intention to engage in a behavior, the
more likely the behavior is to be carried out. According to our model, the stronger
the intention to comply with information security policies is, the more likely it is that
the individual will actually comply with the information security policies.

Threat appraisal consists of two dimensions: perceived vulnerability and
perceived severity. Perceived vulnerability means conditional probability that a
negative event will take place if no measures are taken to encounter it [25]. In the
context of our study, the negative event is any information security threat. Therefore,
in the context of our study, perceived vulnerability refers to employees’ perceived
assessment of whether their organization is vulnerable to information security
threats, which will take place if no measures are taken to counter them.

Perceived severity, on the other hand, refers to the degree of both physical and
psychological harm the threat can cause [25]. In our study, it refers to potential harm
caused by information security breaches in the organization context. Here our
assumption is that if organizations’ employees do not realize that they are really
confronted by information security threats (threat appraisal) and if they do not feel
that these threats can cause consequences with a destructive impact on the
organization (perceived severity), they will not comply with information security
policies.

Therefore, we hypothesize:

HI: Threat appraisal affects employees’ intention to comply with information
security policies.

Coping appraisal is a measure consisting of three dimensions: response
efficacy, self-efficacy, and response cost [26], [27]. Response efficacy relates to the
belief in the perceived benefits of the coping action [26], that is, belief that carrying
out the coping action will remove the threat. In our study, it means that adherence to
information security policies is an effective mechanism for detecting an information
security threat. Self-efficacy emphasizes the individual’s ability or judgment of their
capabilities to perform the coping response actions [6]. Placing self-efficacy theory
in the context of our study, it refers to workers’ beliefs in whether they can apply and
adhere to information security policies; this belief will lead to compliance with these
policies. Maddux and Rogers [19] found in their study that self-efficacy was the
most powerful predictor of intention. In our study, the response costs were not
studied.

Therefore, we hypothesize:

H2: Self-efficacy affects employees’ intention to comply with information security
policies.

Employees’ Adherence to Information Security Policies: An Empirical Study 137

H3: Response efficacy affects employees’ intention to comply with information
security policies.

Sanctions. The concept of deterrence has been a key focus of criminological
theories for more than thirty years. One of the leading theories in the field is GDT,
which was originally developed for controlling criminal behavior [14]. Traditionally,
the classical deterrence theory suggests that certainty, severity, and celerity of
punishment affect people’s decisions on whether to commit a crime or not [14].
Certainty means that an individual believes that his or her criminal behavior will be
detected, while severity means that it will be harshly punished. Celerity signifies that
the sanctions will occur quickly. Straub [34] found that stating penalties for
information security policy non-compliance increases proper information security
behavior. However, studies by Straub [34] and Straub and Welke [35] employ what
Higgins et al. [14] refer to as the classical deterrence theory. Therefore, these
seminal studies by Straub [34], [35] do not address three important components of
contemporary GDT: social disapproval, self-disapproval and impulsivity. Social
disapproval refers to the degree to which family members, friends and co-workers
disapprove of the action. Self-disapproval refers to an individual’s feeling of shame,
guilt, and embarrassment about an action, while impulsivity means low self-control,
that is, the inability of an individual to resist a temptation toward criminal behavior
when an opportunity for it exists. This leads to the following hypothesis:

H4. Sanctions affect employees’ actual compliance with information security
policies.

Intentions indicate people’s willingness to try to perform the behavior in
question [2], adherence to information security policies in this case. Rogers and
Prentice-Dunn [27] suggest that the intentions are the most applicable measure of
protection motivation. Previous research on technology acceptance, for instance,
shows that intentions are good predictors of actual behavior [38], which, in the
context of our study, is adherence to information security policies. Moreover, in our
study, behavioral intention is an indicator of the effects of persuasion related to
information security policies. Thus we can hypothesize:

H5. Employees’ intention to comply with information security policies affects
actual compliance with information security policies.

4 Research methods and results

According to Straub [33] and Boudreau et al. [7], using validated and tested
questions will improve the reliability of constructs and results. Accordingly, we used
items that have been tried and tested by previous studies, when available (Table 1).

138 Mikko Siponen, Seppo Pahnila and Adam Mahmood

Table 1. Constructs and their theoretical background

Construct Theoretical background Adapted from
Intention to comply TRA [1]
Actual compliance TRA [18]
Threat and copying appraisal PMT [27]
Sanctions GDT [14]

All the items are measured using a standard seven-point Likert scale (strongly
disagree – strongly agree). Since the measures presented in Table 1 are not
previously tested in the context of information security policy compliance, the
present research tests these measures in the information security context. Hence, the
questions were pilot tested using 15 people. Based on their feedback, the readability
factor of the questions was improved. The data was collected from four Finnish
companies. A total of 3130 respondents were asked to fill out the web-based
questionnaire. The distribution of the respondents was quite geographically spread
all over Finland. Taking into consideration missing data and invalid responses we
had a total sum of reliable responses of 917, the response rate being 29.3%. 56.1%
were males and 43.9% females.

Reliability and validity. The data analysis was conducted using SPSS 14.0 and
AMOS 6.0 structural equation modeling software (SEM). The mean, standard
deviation and correlations of the constructs are shown in Table 2. The content
validity of the instrument was ensured by the pilot test as discussed above.
Convergent validity was ensured by assessing the factor loadings and by calculating
variance extracted. We conducted a single confirmatory factor analysis for each of
the constructs. As Table 2 shows all the model items loaded well, exceeding 0.50
[12]. Divergent validity was assessed by computing the correlations between
constructs. Correlations between all pairs of constructs were below the threshold
value of 0.90. The variance extracted of all the constructs exceeded 0.5 [13]. Internal
consistency reliability among the items was assessed by calculating Cronbach’s
alpha. As Table 3 shows, Cronbach’s alpha exceeded the suggested value of 0.60 for
all constructs [12]. Hence, the reliability and validity of the constructs in the model
are acceptable.

Table 2. Mean, standard deviation and correlations of the constructs.

Construct Mean Standard 1. 2. 3. 4. 5. 6.
deviation

1. Actual compliance 6.16 0.98 1
2. Intention to comply 6.35 0.88 0.848 1
3. Threat appraisal 5.72 0.99 0.374 0.351 1
4. Response efficacy 4.75 1.43 0.203 0.193 0.215 1
5. Self-efficacy 5.89 1.02 0.407 0.402 0.322 0.256 1
6. Sanctions 3.80 1.58 0.217 0.132 0.333 0.156 0.140 1

Employees’ Adherence to Information Security Policies: An Empirical Study 139

Table 3. Convergent validity and internal consistency and reliability.

Construct Items Factor Variance Cronbach’s alpha
loading extracted

Actual compliance Actcompl 0.65 0.81 0.84
Actcomp2 0.88
ActcompS 0.89

Intention to comply Intcompl 0.71 0.80 0.85
Intcomp2 0.86
IntcompS 0.84

Threat appraisal Thrapprl 0.54 0.62 0.76
Thrappr2 0.65
ThrapprS 0.60
Thrappr4 0.61
Thrappr5 0.70
Thrappr6 Dropped

Response efficacy Respeffil 0.73 0.75 0.80
Respeffi2 0.88
Respeffi3 0.66

Self-efficacy Selfeffil Dropped 0.85 0.83
Selfeffi2 0.89
Selfeffi3 0.80

Sanctions Sanctiol 0.91 0.83 0.90
Sanctio2 0.96
Sanctio3 0.89
Sanctio4 Dropped
Sanctio5 0.59
Sanctio6 Dropped

The model was assessed using the maximum likelihood method. The fitness of
the model was tested in structural equation modeling using goodness-of-fit criteria,
which in practice indicate the degree of compatibility between the proposed model
and the observed covariances and correlations.

140 Mikko Siponen, Seppo Pahnila and Adam Mahmood

Table 4. Convergent validity and internal consistency and reliability.

Model Criteria
X̂ 8.361
df 3
p 0.039
CMIN/DF 2,787 2-3
CFI 0.997 >0.9
NFI 0.995 >0.9
RMSEA 0.044 <0.05

The fit indexes (Table 4) chosen for this study are based on the literature, and
represent three different fit characteristics: absolute fit, comparative fit measures and
global fit measures. The chi-square test (x2) with degrees of freedom, p-value and
sample size is commonly used for absolute model fit criteria [15, 28]. Root mean
square error of approximation fit index (RMSEA) is used to assess the error due to
the simplifying of the model. The Comparative Fit Index (CFI) and Normed Fit
Index (NFI) are recommended for model comparison, for comparison between the
hypothesized and independent models [15, 28]. Overall goodness of fit was assessed
with relative chi-square; x2/ciegree of freedom (CMIN/DF). The fit indices indicate
that the research model provides a good fit with the data.

f Inreat \ Q24***
\ ^ appraisal y^^^^^^

^^’^^-v^^^ 0.22

f Response \ ^ ^ ^ ^ / ^ Intention to comply >v
\ ^ ^ efficacy ^ ^ • ^ f with IS security )

0 . 3 1 * * * ^ ^ ^ , . . . – – – ‘ ‘ – ‘ ‘ ‘ ‘ ^ ^ ^ policies ^ y

f Self-efficacy ^ C ^ 0 98***

\ ^ y ^ 0.71

CActual compliance ^ \ with IS security J
policies >^

/̂ sanctions \ ^ ^ ^ ^ ^ ^

Fig. 1. The research model.

The research model yielded a x2 value of 8.361 with 3 degrees of freedom, with a
p value of 0.039 (Fig. 1). The findings indicate that the direct path from threat
appraisal (6 = 0.24) to intention to comply with IS security policies is significant.
The correlation (Table 2) between threat appraisal and intention to comply with IS

Employees’ Adherence to Information Security Policies: An Empirical Study 141

security policies was quite high (0.351), explaining alone about 12.3% of the
variance in intention to comply with IS security policies. Response efficacy (B =
0.06) and self-efficacy (13 = 0.31) also have a significant effect on intention to
comply with IS security policies. Sanctions (13 = 0.09) have a significant effect on
actual compliance with IS security policies. Intention to comply with IS security
policies (13 = 0.98) has a significant effect on actual compliance with IS security
policies. In all, the research model accounts for 71% (R2 = 0.71) of the variance in
actual compliance.

5 Conclusive discussion

The literature agrees that the major threat to information security is constituted by
careless employees who do not comply with organizations’ information security
policies and procedures. Hence, employees have not only to be aware of, but also to
comply with organizations’ information security policies and procedures. To address
this important concern, different information security awareness, education and
enforcement approaches have been proposed. Prior research on information security
policy compliance has criticized these extant information security policy compliance
approaches as lacking (1) theoretically and (2) empirically grounded principles to
ensure that employees comply with information security policies. To address these
two problems in the current research, this study first put forward a new model in
order to explain employees’ information security compliance. This model combined
the Protection Motivation Theory, the Theory of Reasoned Action and the General
Deterrence Theory. Second, to validate this model empirically, we collected data (N
= 917) from four companies.

We found that threat appraisal has a significant impact on intention to comply
with information security policies. Hence, it is important that employees are made
aware of the information security threats and their severity and celerity for the
organization. To be more precise, our findings suggest that practitioners should
emphasize to the employees that not only are information security breaches
becoming more and more serious for the business of organizations, but their severity
to the business of the organization is also increasing.

Self-efficacy, referring to employees’ beliefs in whether they can apply and
adhere to information security policies, will lead to compliance with these policies in
the context of our study, and has a significant impact on intention to comply with
information security policies. This finding stresses the perceived relevance of
information security policies. If employees do not perceive information security
policies as relevant and sufficiently up-to-date for their work, they will not adhere to
the policies. Yet it also suggests that it is important to ensure through information
security education or verbal persuasion, for example, that employees really can use
information security measures.

Our results show that response efficacy has a significant effect on intention to
comply with information security policies. In order to minimize IS security breaches,
first it is important that the organization’s IS security personnel is aware of IS

142 Mikko Siponen, Seppo Pahnila and Adam Mahmood

security threats and knows how to react them. Second, IS security policy should be
clear and up-to-date, and third, employees should comply with IS security policies.

Sanctions have a significant impact on actual compliance with information
security policies. This means in practice that practitioners need to state the sanctions
for information security policy non-compliance in a visible manner. In particular, it
is important to get employees to believe that their non-compliance with information
security policies will be detected and severe legal sanctions will take place. The
findings also suggest that the detection must occur quickly. Also, on the basis of our
findings, information security practitioners should realize that social pressure
(sanctions: social disapproval) towards information security policy compliance from
top management, the employee’s immediate supervisor, peers and information
security staff is important for ensuring employees’ information security policy
compliance. This is consistent with the findings that social environment has an effect
on individuals’ behavior [2]. To create and ensure such verbal persuasion, top
management, immediate supervisors and information security staff should clearly
and explicitly explain the importance of complying with information security polices
to their employees. This finding has implications for the information security
education strategy of organizations. In the light of our finding, organizations should
pay special attention to educating top management, supervisors and information
security staff in order that they can spread the word on the importance of adherence
to information security policies, and hence create social pressure towards
information security policy compliance. This is good news for large corporations
who may face difficulties educating all their employees.

Finally, intention to comply with information security policies has a significant
impact on actual compliance with information security policies. Intention is a
motivational factor that influences a behavior by indicating how hard people are
willing to try and how much of an effort they are planning to exert in order to
perform the behavior. The stronger the intention to engage in the behavior, the more
likely it is to be performed [2].

6 References

1. Agarwal, R. and J. Prasad, Conceptual and Operational Definition of Personal
Innovativeness in the Domain of Information Technology. Information Systems Research,
1998. 9(2): p. 204-215.

2. Ajzen, I., “The Theory of Planned Behavior”, Organizational Behavior and Human
Decision Processes 50X 1991, 179-211.

3. Aytes, K. and Connolly, T., “A Research Model for Investigating Human Behavior Related
to Computer Security”, Proceedings of the 2003 American Conference On Information
Systems, Tampa, FL, August 4-6. 2003.

4. Aytes, K. and Connolly, T., “Computer and Risky Computing Practices: A Rational Choice
Perspective”, Journal of Organizational and End User Computing, 16,2, 2004, 22-40.

5. Bagchi, K. and Udo, G., “An analysis of the growth of computer and Internet security
breaches”. Communications ofAIS 12, 2003, 684-700.

6. Bandura, A., “Self-Efficacy: Toward a Unifying Theory of Behaviour Change”,
Psychological Review 84, 2, 1977, 191-215.

Employees’ Adherence to Information Security Policies: An Empirical Study 143

7. Boudreau, M.-C, Gefen, D. and Straub, D. W., “Validation in information systems
research: A state-of-the-art assessment.” MIS Quarterly 25, 1, 2001, 1-16.

8. Fishbein, M. and Ajzen, I., Belief, Attitude, Intention and Behavior: An Introduction to
Theory and Research. MA, Addison-Wesley. 1975.

9. Furnell, S. M., Gennatou, M. and Dowland P. S., “A prototype tool for information security
awareness and training”. International Journal of Logistics Information Management, 15,
5, 2002, 352-357.

10. Furnell, S., Sanders, P. W. and Warren, M. J., ”Addressing information security training
and awareness within the European healthcare community”, in Proceedings of Medical
Informatics Europe ’97. 1997.

11. Gaunt, N., “Installing an appropriate information security policy in hospitals”,
InternationalJournal of Medical Informatics, 49, 1, 1998, 131-134.

12. Hair, J.F.J., Anderson, R.E., Tatham, R.L., and Black, W. C , Multivariate data analysis. 5
ed: Upper Saddle River, New Jersey, Prentice Hall Inc. 1998.

13. Hair, J.F.J., Black, W.C, Babin, B.J, Anderson, R.E., Tatham, R.L., Multivariate data
analysis. Sixth ed. 2006: Pearson Prentice Hall.

14. Higgins, G.E., Wilson, A.L. and Fell, B.D., “An Application of Deterrence Theory to
Software Piracy”, Journal of CriminalJustice and Popular Culture, 12, 3, 2005, 166-184.

15. Hoyle, R.H., Structural Equation Model. Conceprts, Issues, and Applications., ed. H. Rick,
Hoyle. 1995: SAGE publications. Inc.

16. Katsikas, S. K., “Health care management and information system security: awareness,
training or education”. International Journal of Medical Informatics, 60, 2, 2000, 129-135.

17. Lee, J. and Lee, Y., “A holistic model of computer abuse within organizations”.
Information management & computer security, 10, 2, 2002, 57-63.

18. Limayem, M., and Hirt, S.G., “Force of Habit and Information Systems Usage: Theory and
Initial Validation”, Journal of Association for Information Systems, 4, 2003, 65-97.

19. Maddux, J.E. and R.W. Rogers, Protection Motivation and Self-Efficacy: A Revised
Theory of Fear Appeals and Attitude Change. Journal of experimental social psychology,
1983. 19: p. 469-479.

20. McCoy, C. and Fowler, R.T., “You are the key to security”: establishing a successful
security awareness program. In the proceedings of the SIGUCCS’04, Baltimore, Maryland,
October 10-13, 2004, 346-349.

21. McLean, K., “Information security awareness – selling the cause”, in Proceedings of the
IFIP T C l l , Eighth International Conference on information security, IFIP/Sec ’92. 1992.

22. Parker, D. B., Fighting Computer Crime: A new Framework for Protecting Information,
John Wiley & Sons, USA. 1998.

23. Perry, W. E., Management Strategies for Computer Security, Butterworth Publishers,
USA. 1985.

24. Puhakainen, P. Design Theory for Information Security Awareness, 2006. Ph.D Thesis, the
University of Oulu, Finland.

25. Rippetoe, S. and Rogers, R. W., “Effects of Components of Protection – Motivation
Theory on Adaptive and Maladaptive Coping with a Health Threat”, Journal of Personality
and Social Psychology, 52, 3, 1987, 596-604.

26. Rogers, R. W., ”Cognitive and Physiological Processes in Fear Appeals and Attitude
Change: A Revised Theory of Protection Motivation Theory”, in Social Psychophysiology,
J. Cacioppo and R. Petty (Eds.), Guilford, New York, 1983.

27. Rogers, R. W. and Prentice-Dunn, S., “Protection motivation theory”. In D. S. Gochman
(Ed.), Handbook of Health Behavior Research I: Personal and Social Determinants, New
York, NY: Plenum Press, 1997, 113-132.

28. Schumacker, R.E. and R.G. Lomax, A Beginner’s Guide to Structural Equation Modeling.
1996, Mahwah, New Jersey: Lawrence Erlbaum Associates. 288.

144 Mikko Siponen, Seppo Pahnila and Adam Mahmood

29. Siponen, M., ”A Conceptual Foundation for Organizational Information Security
Awareness”, Information Management & Computer Security, 8, 1, 2000, 31-41.

30. Sommers, K. and Robinson, B., “Security awareness training for students at Virginia
Commonwealth University”, In the proceedings of the SIGUCCS’04, Baltimore,
Maryland, October 10-13, 2004, 379-380.

31. Spurling, P., “Promoting security awareness and commitmenf, Information Management
& Computer Security, 3, 2, 1995, 20-26.

32. Stanton, J. M., Stam, K. R., Mastrangelo, P. and Jolton, J., “An analysis of end user
security behaviors”. Computers & Security, 24, 2005, 124-133

33. Straub, D. W., “Validating Instruments in MIS Research”, MIS Quarterly, 13, 2, 1989,
147-169.

34. Straub, D.W., “Effective IS Security: An Empirical Study”, Information Systems Research,
1,3,1990,255-276.

35. Straub, D.W. and Welke, R.J., “Coping with Systems Risk: Security Planning Models for.
Management Decision-Making”, MIS Quarterly, 22, 4, 1998, 441-469.

36. Thomson, M.E. and von Solms, R., “An effective information security awareness program
for industry”, in proceedings of the WG 11.2 and WG 11.1 of the TC-11 IFIP, 1997.

37. Thomson, M. E. and von Solms, R., “Information security Awareness: educating your
users effectively”. Information Management & Computer Security, 6, 4, 1998, 167-173.

38. Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D., “User Acceptance of
Information Technology: Toward a Unified View”, MIS Quarterly, 27, 3, 2003, 425-478

39. Wood, C. C , “Information Security Awareness Raising Methods”, Computer Fraud &
Security Bulletin, Elsevier Science Publishers, Oxford, England, June 1995, pp 13-15.

40. Woon, I. M. Y., Tan, G. W. and Low, R. T., “A Protection Motivation Theory Approach to
Home Wireless Security”, Proceedings of the Twenty-Sixth International Conference on
Information Systems, Las Vegas, 2005, 367-380.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy