Charles Darwin University

CDU eSpace
Institutional Repository

 
CDU Staff and Student only
 

A comparative study and analysis between the PP model and current security compliance models

Dangi, Kumar (2015). A comparative study and analysis between the PP model and current security compliance models. Master of Information Technology Thesis, Charles Darwin University.

Document type: Thesis
Citation counts: Google Scholar Search Google Scholar
Attached Files (Some files may be inaccessible until you login with your CDU eSpace credentials)
Name Description MIMEType Size Downloads
Download this reading Thesis_CDU_52951_Dangi_K.pdf PDF version generated by CDU application/pdf 920.18KB 404
Reading the attached file works best in Firefox, Chrome and IE 9 or later.

Author Dangi, Kumar
Title A comparative study and analysis between the PP model and current security compliance models
Institution Charles Darwin University
Publication Date 2015
Thesis Type Master of Information Technology
Subjects ENGINEERING
080309 - Software Engineering
Abstract We live in an age where “information” and “security” are the two pivotal elements of human society. The security of the information, therefore, has now been an area of great concern and its importance been intensified exponentially. Organizations develop, formulate and update security compliance policies and standards to ensure that every bit of information is well protected and under the umbrella of security policies and high scrutiny of organizational care. The past researches conducted in the domain of human behavioural studies highlights the fact that internal threats are more pressing and detrimental than the external threats. Thus, internal threats predominantly is the outcome of poor user security behaviour and sometimes, due to poor security compliance policies of the organization.

In this research, we draw, explore and analyse on literature in the area of behavioural compliance theories such as General Deterrence theory, Protection motivation theory (PMT), Theory of Planned Behaviour (TPB), Rational Choice theory and Job Demands-Resource Model (JR-D). We proposed the PP model (Positive Traits, Personal Strength), which shows the requirements for employees’ information security compliance. The introduced PP (Positive Traits, Personal Strength) model is a framework that is based on two main personal positive characteristics namely, the employee’s positive traits (courage, interpersonal skills, wisdom, positive experience, leadership skills) and personal strengths (self-efficacy, expertise, optimism). We strongly believe that organizations’ identification and awareness of these traits within their employees would result during the development of security policies would result in sustainable employees’ security compliance.
Keyword information security
compliance
positive psychology
behavioural theory
positive traits


© copyright

Every reasonable effort has been made to ensure that permission has been obtained for items included in CDU eSpace. If you believe that your rights have been infringed by this repository, please contact digitisation@cdu.edu.au.

 
Versions
Version Filter Type
Access Statistics: 110 Abstract Views, 404 File Downloads  -  Detailed Statistics
Created: Wed, 09 Dec 2015, 09:09:05 CST by Jessie Ng