Adapting Information Security Policy Messaging Styles to the Targeted Audience
Arnaud Denis,
Tatjana Volkova,
Simon Grima,
Graţiela Georgiana Noja and
Mirela Cristea
A chapter in Digital Transformation, Strategic Resilience, Cyber Security and Risk Management, 2023, vol. 111A, pp 115-131 from Emerald Group Publishing Limited
Abstract:
Current research aims to investigate whether it would be possible to identify all information security policy (ISP) writing styles and how these would influence ISP compliance. Almost all businesses use ISPs to establish boundaries and require secure behaviour from their employees. Unfortunately, professional surveys and academic research demonstrate a high level of non-compliance with the ISP. While the justification for the employee’s behaviour has been discussed, very few research papers have investigated whether the ISP writing style impacted the intent to comply with ISP. The research methodology incorporates content analysis and a quantitative descriptive review of published papers on ISP and non-IS policy compliance. The theoretical research allowed the identification of five major ISP writing styles: belonging, deterrence, goal, motivation, and specialist, as well as writing style influencers such as timeliness and readability. To achieve a higher level of compliance with the ISP, it was suggested that the writing styles of belonging, goal, and motivation be used primarily. Deterrence is generally discouraged. The study enabled us to determine when ISP writing styles were mentioned and the type of influence on the intent to comply with ISP. It also allowed for comparison and possible differences in ISPs versus standard workplace policies. There are proposals on which writing styles to put forward, along with recommendations on creating an ISP.
Keywords: Information security; information security policies; compliance; ISP writing style; employer’s behaviour; ICT governance (search for similar items in EconPapers)
Date: 2023
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.emerald.com/insight/content/doi/10.110 ... d&utm_campaign=repec (text/html)
https://www.emerald.com/insight/content/doi/10.110 ... 9-37592023000111A008
https://www.emerald.com/insight/content/doi/10.110 ... d&utm_campaign=repec (application/pdf)
Access to full text is restricted to subscribers
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:eme:csefzz:s1569-37592023000111a008
DOI: 10.1108/S1569-37592023000111A008
Access Statistics for this chapter
More chapters in Contemporary Studies in Economic and Financial Analysis from Emerald Group Publishing Limited
Bibliographic data for series maintained by Emerald Support ().