Empowerment and BYOx: Towards Improved IS Security Compliance

Maximilian von Welck, Manuel Trenz, Tina Blegind Jensen, Daniel Veit

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Non-compliant employees continue to pose a serious threat to information systems security. Most attempts to increase compliant behavior rely on measures that reduce employees’ latitude. However, recent studies suggest that this indeed eventuates in less compliance due to adverse behaviors of frustrated or stressed employees. In this study, we propose a novel approach where increased latitude –by means of permitting BYOx–increases the intention to comply. In order to do so, we first construct a theoretical model that links BYOx with empowerment and abuse intention. Subsequently, we run a feasibility study to assess our experimental design and the general feasibility of our propositions. The results suggest that psychological empowerment can indeed be manipulated with vignettes, and that changes in empowerment influence individuals’ abuse intentions. Based on such initial promising results, we outline how this novel approach to improve IS security compliance can be developed and investigated further.
Original languageEnglish
Title of host publicationICIS 2017 Proceedings
Number of pages11
Place of PublicationAtlanta, GA
PublisherAssociation for Information Systems. AIS Electronic Library (AISeL)
Publication date2017
Publication statusPublished - 2017
EventICIS 2017: Transforming Society with Digital Innovation - Coex Convention Center , Seoul, Korea, Republic of
Duration: 10 Dec 201713 Dec 2017
Conference number: 38
https://icis2017.aisnet.org/

Conference

ConferenceICIS 2017
Number38
LocationCoex Convention Center
CountryKorea, Republic of
CitySeoul
Period10/12/201713/12/2017
Internet address
SeriesProceedings of the International Conference on Information Systems
ISSN0000-0033

Keywords

  • Information systems security
  • Compliance
  • Empowerment
  • IT consumerization
  • Shadow IT
  • Bring your own x (BYOx)
  • BYOD
  • BYOS
  • Factorial survey

Cite this