Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/120786
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDenis, Arnaud-
dc.contributor.authorVolkova, Tatjana-
dc.contributor.authorGrima, Simon-
dc.contributor.authorNoja, Graţiela Georgiana-
dc.contributor.authorCristea, Mirela-
dc.date.accessioned2024-04-12T09:22:07Z-
dc.date.available2024-04-12T09:22:07Z-
dc.date.issued2023-
dc.identifier.citationDenis, A., Volkova, T., Grima, S., Noja, G. G., & Cristea, M. (2023). Adapting information security policy messaging styles to the targeted audience. In S. Grima, E. Thalassinos, M. Cristea, M. Kadłubek, D. Maditinos & L. Peiseniece (Eds.), Digital transformation, strategic resilience, cyber security and risk management (pp. 115-131). United Kingdom: Emerald Publishing Limiteden_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/120786-
dc.description.abstractCurrent research aims to investigate whether it would be possible to identify all information security policy (ISP) writing styles and how these would influence ISP compliance. Almost all businesses use ISPs to establish boundaries and require secure behaviour from their employees. Unfortunately, professional surveys and academic research demonstrate a high level of non-compliance with the ISP. While the justification for the employee’s behaviour has been discussed, very few research papers have investigated whether the ISP writing style impacted the intent to comply with ISP. The research methodology incorporates content analysis and a quantitative descriptive review of published papers on ISP and non-IS policy compliance. The theoretical research allowed the identification of five major ISP writing styles: belonging, deterrence, goal, motivation, and specialist, as well as writing style influencers such as timeliness and readability. To achieve a higher level of compliance with the ISP, it was suggested that the writing styles of belonging, goal, and motivation be used primarily. Deterrence is generally discouraged. The study enabled us to determine when ISP writing styles were mentioned and the type of influence on the intent to comply with ISP. It also allowed for comparison and possible differences in ISPs versus standard workplace policies. There are proposals on which writing styles to put forward, along with recommendations on creating an ISP.en_GB
dc.language.isoenen_GB
dc.publisherEmerald Publishing Limiteden_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectComputer security -- Law and legislationen_GB
dc.subjectInformation technology -- Researchen_GB
dc.subjectInformation policyen_GB
dc.subjectInformation behavioren_GB
dc.subjectComputer networks -- Security measuresen_GB
dc.subjectCyberspace -- Security measuresen_GB
dc.titleAdapting information security policy messaging styles to the targeted audienceen_GB
dc.title.alternativeDigital transformation, strategic resilience, cyber security and risk managementen_GB
dc.typebookParten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.description.reviewedpeer-revieweden_GB
dc.identifier.doi10.1108/S1569-37592023000111A008-
Appears in Collections:Scholarly Works - FacEMAIns

Files in This Item:
File Description SizeFormat 
Adapting_Information_Security_Policy_Messaging_Styles_to_the_Targeted_Audience_2023.pdf
  Restricted Access
1.17 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.