Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, Xin Luo, Gregory D. Moody, Robert Willison

Research output: Contribution to journalArticlepeer-review

59 Citations (Scopus)

Abstract

Organizational information security (ISec) threats have exploded with advances in globalization and technology. Thus, organizations are scrambling to find both technical and behavioral approaches to shore up security. Whereas security technologies are crucial to these efforts, they are often rendered useless by employees' misunderstanding, carelessness, or deliberate disregard of ISec polices (ISPs). Accordingly, organizations are increasingly seeking ways to encourage employees to work as security allies. A key approach in many organizations is encouraging employees to better understand and comply with ISPs. Consequently, ISec research has leveraged several theories to identify the underlying reasons for ISP compliance behaviors among employees. However, most of this research focuses unilaterally on compliance without simultaneously considering noncompliance, as if noncompliance were caused by opposite factors. A pressing need thus exists for a theoretical foundation that can consider both common outcomes and whether there is an explainable tipping point that can explain when a normally compliant employee chooses to become noncompliant, and vice versa. In this study, we contextualize the extended parallel process model (EPPM) to ISP compliance by accounting for dual outcomes of compliance/noncompliance and dual roles of coping-problem-focused coping and emotion-focused coping. We further extend the EPPM to include response costs and maladaptive rewards to predict the two possible outcomes. Additionally, we employ a weighted discriminant value measurement approach to examine the tipping point between compliance and noncompliance. To test our resulting theoretical model and new measure, we conducted two separate empirical studies with 816 employees, using survey and scenario methodologies. The empirical results from these studies indicate that our contextualization and extension of EPPM better explain the gaps than alternative theories in the ISP literature.

Original languageEnglish
Pages (from-to)1043-1065
Number of pages23
JournalInformation Systems Research
Volume32
Issue number3
DOIs
Publication statusPublished - Sept 2021

Keywords

  • Extended parallel processing model
  • Information security
  • Organizational security
  • Protection motivation theory

Fingerprint

Dive into the research topics of 'Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model'. Together they form a unique fingerprint.

Cite this