This paper focuses on explaining employees' compliance with information security guidelines in Dutch local government. Information security has been given ample attention in government organizations in the Netherlands since the implementation of GDPR legislation in May 2018, and government organizations are, in general, an interesting context for information security research as government organization gather, process and disseminate large volumes of personal data, and therefore are in principal vulnerable to security risks. Using results from existing literate reviews, hypotheses are developed that suggest compliance is associated with individual employees' risk aversion, risk awareness, sanctions, peer pressure and management style. In order to test the hypotheses, three vignettes of security breaches (using unencrypted personal data, not logging out of unattended workstations, USB media lying around in the workplace) were developed and included in a questionnaire that was filled out by 153 public sector employees working for various local governments in the Netherlands. Multiple hierarchical regression analyses were used to test the hypotheses; risk awareness was found to have a significant impact on security policy compliance for two of the three vignettes, whereas hypotheses relating risk aversion, sanctions and management style to security policy compliance received no empirical support. Low levels of explained variance in the statistical analyses indicate that future models should incorporate other variables than those included in this study to better explain information security policy compliance.

Additional Metadata
Keywords Behaviors, GDPR, Information security policy compliance, Neutralization, Privacy, Public sector, Public sector motivations
Persistent URL dx.doi.org/10.34190/ICCWS.20.025, hdl.handle.net/1765/126301
Conference 15th International Conference on Cyber Warfare and Security, ICCWS 2020
Citation
Homburg, V.M.F, & Kokje, J. (2020). Information policy security compliance in Dutch local government. In Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020 (pp. 211–218). doi:10.34190/ICCWS.20.025