Determinants of Compliance With Information Systems Security Controls: A Case of a Business Organization in South Africa

Determinants of Compliance With Information Systems Security Controls: A Case of a Business Organization in South Africa

Ntokozo Siphesihle Ndlovu, Patrick Ndayizigamiye, Macire Kante
ISBN13: 9781799886938|ISBN10: 179988693X|ISBN13 Softcover: 9781799886945|EISBN13: 9781799886952
DOI: 10.4018/978-1-7998-8693-8.ch003
Cite Chapter Cite Chapter

MLA

Ndlovu, Ntokozo Siphesihle, et al. "Determinants of Compliance With Information Systems Security Controls: A Case of a Business Organization in South Africa." Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security, edited by Maurice Dawson, et al., IGI Global, 2022, pp. 34-61. https://doi.org/10.4018/978-1-7998-8693-8.ch003

APA

Ndlovu, N. S., Ndayizigamiye, P., & Kante, M. (2022). Determinants of Compliance With Information Systems Security Controls: A Case of a Business Organization in South Africa. In M. Dawson, O. Tabona, & T. Maupong (Eds.), Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (pp. 34-61). IGI Global. https://doi.org/10.4018/978-1-7998-8693-8.ch003

Chicago

Ndlovu, Ntokozo Siphesihle, Patrick Ndayizigamiye, and Macire Kante. "Determinants of Compliance With Information Systems Security Controls: A Case of a Business Organization in South Africa." In Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security, edited by Maurice Dawson, Oteng Tabona, and Thabiso Maupong, 34-61. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-8693-8.ch003

Export Reference

Mendeley
Favorite

Abstract

The purpose of this study is to determine the factors that critically contribute to employees of an organization complying with the information security controls that have been set in place. Whether it is an attitude or an intention that leads to complying, this chapter looks at the theory of planned behavior (TPB). A company was chosen, and a questionnaire was handed out to the employees. The questionnaire distributed focuses only on the elements that are within the theory of planned behavior model. The questionnaire is anonymous, and because of this, the confidence and confidentiality are given. As a result of these two factors, it was seen that the elements of the chosen model are not 100% the contributing factor as to why employees comply with information security controls within Company X. It is therefore implied that more research has to be done to figure out what exactly makes the employees comply.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.