Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts
暂无分享,去创建一个
Tom L. Roberts | James F. Courtney | Clay Posey | Rebecca J. Bennett | A. J. Burns | R. Bennett | Clay Posey | T. Roberts | J. Courtney | Alan J. Burns
[1] Mikko T. Siponen,et al. Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study , 2010, MIS Q..
[2] J. Schlacter,et al. Motivating Employees to Act Ethically: An Expectancy Theory Approach , 1999 .
[3] Jordan Shropshire,et al. The influence of the informal social learning environment on information privacy policy compliance efficacy and intention , 2011, Eur. J. Inf. Syst..
[4] Robert D. Pritchard,et al. Expectancy theory measures: An empirical comparison in an experimental simulation. , 1981 .
[5] Moez Limayem,et al. Data Collection in the Digital Age: Innovative Alterantives to Student Samples , 2014, MIS Q..
[6] Paul Benjamin Lowry,et al. "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..
[7] I. Ajzen. The theory of planned behavior , 1991 .
[8] Eirik Albrechtsen,et al. The information security digital divide between information security managers and users , 2009, Comput. Secur..
[9] Marcia J. Simmering,et al. A Tale of Three Perspectives , 2009 .
[10] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[11] Kuang-Wei Wen,et al. Organizations' Information Security Policy Compliance: Stick or Carrot Approach? , 2012, J. Manag. Inf. Syst..
[12] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[13] R. W. Rogers,et al. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .
[14] Simon S. K. Lam,et al. Instrumental values of organizational citizenship behavior for promotion: a field quasi-experiment. , 2000, The Journal of applied psychology.
[15] David W. Gerbing,et al. An Updated Paradigm for Scale Development Incorporating Unidimensionality and Its Assessment , 1988 .
[16] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[17] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[18] Paul Benjamin Lowry,et al. The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness , 2015, Inf. Syst. Res..
[19] Alexandra Durcikova,et al. What, I Shouldn't Have Done That? : The Influence of Training and Just-in-Time Reminders on Secure Behavior , 2013, ICIS.
[20] Detmar W. Straub,et al. Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..
[21] Gerardine De Sanctis,et al. Expectancy Theory as an Explanation of Voluntary Use of a Decision-Support System: , 1983 .
[22] Tejaswini Herath,et al. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..
[23] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[24] L. J. Williams,et al. An Alternative Approach to Method Effects by Using Latent-Variable Models: Applications in Organizational Behavior Research , 1994 .
[25] Jan H. P. Eloff,et al. Information security: The moving target , 2009, Comput. Secur..
[26] Tamara Dinev,et al. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..
[27] P. Bentler,et al. Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .
[28] Eirik Albrechtsen,et al. Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study , 2010, Comput. Secur..
[29] Tom L. Roberts,et al. Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..
[30] Jintae Lee,et al. A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..
[31] William Buhrow,et al. Does survey format influence self-disclosure on sensitive question items? , 2012, Comput. Hum. Behav..
[32] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[33] Varun Grover,et al. An Application of Expectancy Theory for Assessing User Motivation to Utilize an Expert System , 1992, J. Manag. Inf. Syst..
[34] Kenneth J. Harris,et al. The moderating effects of political skill on the perceived politics–outcome relationships , 2011 .
[35] Changquan Jiao,et al. Leadership and Organizational Citizenship Behavior: OCB-Specific Meanings as Mediators , 2011 .
[36] Cheolho Yoon,et al. Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms , 2013, Inf. Technol. People.
[37] C. Dweck. The role of expectations and attributions in the alleviation of learned helplessness. , 1975 .
[38] Kuang-Wei Wen,et al. Impacts of Comprehensive Information Security Programs on Information Security Culture , 2015, J. Comput. Inf. Syst..
[39] Jeffrey D. Wall,et al. Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy , 2013 .
[40] Tom L. Roberts,et al. The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets , 2015, J. Manag. Inf. Syst..
[41] Paul E. Levy,et al. The Importance of Instrumentality Beliefs in the Prediction of Organizational Citizenship Behaviors , 2001 .
[42] Donald M. Truxillo,et al. Development and examination of an expectancy-based measure of test-taking motivation. , 2000, The Journal of applied psychology.
[43] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[44] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[45] Elizabeth Wolfe Morrison,et al. Role Definitions and Organizational Citizenship Behavior: The Importance of the Employee's Perspective , 1994 .
[46] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[47] Tom L. Roberts,et al. Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals , 2017, Comput. Hum. Behav..
[48] Mikko T. Siponen,et al. Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches , 2011, J. Assoc. Inf. Syst..
[49] Laurie J. Kirsch,et al. If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security , 2009, Eur. J. Inf. Syst..
[50] Mo Adam Mahmood,et al. Compliance with Information Security Policies: An Empirical Investigation , 2010, Computer.
[51] Paul Benjamin Lowry,et al. Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..
[52] I. Ajzen,et al. Attitudes and normative beliefs as factors influencing behavioral intentions. , 1972 .
[53] Gerardine DeSanctis,et al. CONTINUITY IN MIS/DSS LABORATORY RESEARCH: THE CASE FOR A COMMON GAMING SIMULATOR* , 1983 .
[54] Tejaswini Herath,et al. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..
[55] Mikko T. Siponen,et al. A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..
[56] Tero Vartiainen,et al. What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..
[57] Tejaswini Herath,et al. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..
[58] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[59] Michael Ahearne,et al. Some Possible Antecedents and Consequences of In-Role and Extra-Role Salesperson Performance , 1998 .
[60] A. Hovav,et al. Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures , 2009 .
[61] Tom Roberts,et al. Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective , 2015, AIS Trans. Hum. Comput. Interact..
[62] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[63] W. V. Eerde,et al. Vroom's expectancy models and work-related criteria: A meta-analysis , 1996 .
[64] Dan Jong Kim,et al. A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate , 2013, 2013 46th Hawaii International Conference on System Sciences.
[65] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[66] Chun Hui,et al. Psychological contract and organizational citizenship behavior in China: investigating generalizability and instrumentality. , 2004, The Journal of applied psychology.
[67] Jongwoo Kim,et al. Incident-centered information security: Managing a strategic balance between prevention and response , 2014, Inf. Manag..
[68] Ken H. Guo. Security-related behavior in using information systems in the workplace: A review and synthesis , 2013, Comput. Secur..
[69] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[70] Henri Barki,et al. User Participation in Information Systems Security Risk Management , 2010, MIS Q..
[71] Princely Ifinedo,et al. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..
[72] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[73] Detmar W. Straub,et al. Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture , 2008, J. Manag. Inf. Syst..
[74] Dennis F. Galletta,et al. The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..
[75] Jie Zhang,et al. Impact of perceived technical protection on security behaviors , 2009, Inf. Manag. Comput. Secur..
[76] Jill E. Ellingson,et al. Understanding Faking Behavior Through the Lens of Motivation: An Application of VIE Theory , 2011 .
[77] C. Carver,et al. Control theory: a useful conceptual framework for personality-social, clinical, and health psychology. , 1982, Psychological bulletin.
[78] N. Feather. Values, valences, and choice: The influences of values on the perceived attractiveness and choice of alternatives. , 1995 .
[79] Paul Benjamin Lowry,et al. Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies , 2015, Inf. Syst. J..
[80] Tom L. Roberts,et al. Organizational information security as a complex adaptive system: insights from three agent-based models , 2015, Information Systems Frontiers.