Employees' adherence to information security policies: A partial replication

David Sikolia, Douglas Twitchell, Glen Sagers

Research output: Contribution to conferencePaperpeer-review

5 Scopus citations

Abstract

This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory based model that explained employees' adherence to security policies. Their paper combined elements from Protection Motivation Theory (PMT), the Theory of Reasoned Action, and Cognitive Evaluation Theory. This study is a partial conceptual replication of the PMT portion of their model. We collected our data from employees of a large mid-western university. Our results, based on 110 records contradict the findings of the original study. Where, three of the four constructs in the original study (Severity, Vulnerability, and Self-Efficacy) were found to be significant, our study found the opposite, the only significant path was Response Efficacy. Our study failed to replicate the findings in the original paper. Future studies are encouraged to methodically replicate the original study by using the same measures, treatments and statistics.

Original languageEnglish
StatePublished - 2016
Event22nd Americas Conference on Information Systems: Surfing the IT Innovation Wave, AMCIS 2016 - San Diego, United States
Duration: 11 Aug 201614 Aug 2016

Conference

Conference22nd Americas Conference on Information Systems: Surfing the IT Innovation Wave, AMCIS 2016
Country/TerritoryUnited States
CitySan Diego
Period11/08/1614/08/16

Keywords

  • Conceptual replication
  • Information security policy compliance
  • Protection Motivation Theory

Fingerprint

Dive into the research topics of 'Employees' adherence to information security policies: A partial replication'. Together they form a unique fingerprint.

Cite this