To Örebro University

oru.seÖrebro University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Validating and extending the unified model of information security policy compliance
Örebro University, Örebro University School of Business. Department of Informatics.ORCID iD: 0000-0003-0658-4548
2025 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, no 1, p. 25-48Article in journal (Refereed) Published
Abstract [en]

Purpose: The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).

Design/methodology/approach: To be able to compare the results of this study and those reported by Moody et al. (2018) (and followers), the same quantitative data collection method (questionnaire) and variable measurement instruments were used. Specifically, questionnaire data were collected from a department within a Swedish governmental organization comprising 150 employees. Of these, 90 answered the questionnaire which rendered a response rate of 60%. Following Moody et al. (2018), the collected data were analyzed by means of structural equation modeling.

Findings: This study generally provides empirical support for the original UMISPC as a large majority of the findings are in line with those reported by Moody et al. (2018). However, it also suggests important differences and boundary conditions.

Originality/value: This study extends the original study of Moody et al. (2018) and subsequent replication studies by testing it in a new national/organizational context. Based on their call for future research, it also develops and empirically tests the effects of a new, socially visible information system security violation scenario. Related to this, this study also revisits the role of the variable subjective norms for better understanding employee non-/compliance to information security policies by suggesting that their effects may be indirect (i.e. running through other variables in the UMISPC) rather than direct.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025. Vol. 33, no 1, p. 25-48
Keywords [en]
Unified model of information security policy compliance, UMISPC, Information security policy, Non-compliance, Compliance, Information system security management
National Category
Information Systems
Identifiers
URN: urn:nbn:se:oru:diva-115900DOI: 10.1108/ICS-12-2023-0263ISI: 001303467000001Scopus ID: 2-s2.0-85203020419OAI: oai:DiVA.org:oru-115900DiVA, id: diva2:1897119
Available from: 2024-09-12 Created: 2024-09-12 Last updated: 2025-01-30Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Gerdin, Marcus

Search in DiVA

By author/editor
Gerdin, Marcus
By organisation
Örebro University School of Business
In the same journal
Information and Computer Security
Information Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 31 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf