The Theory of Planned Behavior and Information Security Policy Compliance

Teodor Sommestad,Henrik Karlzén,Jonas Hallberg
DOI: https://doi.org/10.1080/08874417.2017.1368421
2017-09-18
Journal of Computer Information Systems
Abstract:Much of the research on security policy compliance has tested the relationships posited by the theory of planned behavior. This theory explains far from all of the measurable variance in policy compliance intentions. However, it is associated with something called the sufficiency assumption, which essentially states that no variable is missing from the theory. This paper addresses this assumption in the context of information security policy compliance. A meta-analysis of published tests on information security behavior and a review of the literature in related fields are used to identify variables that have the potential to improve the theory’s predictions. These results are tested using a random sample of 645 white-collar workers. The results suggest that the variables anticipated regret and habit improve the predictions. The variables increase the explained variance by 3.4 and 2.6 percentage points, respectively, when they are added individually, and by 5.4 percentage points when both are added.
computer science, information systems
What problem does this paper attempt to address?