Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts

[1]  Mikko T. Siponen,et al.  Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study , 2010, MIS Q..

[2]  J. Schlacter,et al.  Motivating Employees to Act Ethically: An Expectancy Theory Approach , 1999 .

[3]  Jordan Shropshire,et al.  The influence of the informal social learning environment on information privacy policy compliance efficacy and intention , 2011, Eur. J. Inf. Syst..

[4]  Robert D. Pritchard,et al.  Expectancy theory measures: An empirical comparison in an experimental simulation. , 1981 .

[5]  Moez Limayem,et al.  Data Collection in the Digital Age: Innovative Alterantives to Student Samples , 2014, MIS Q..

[6]  Paul Benjamin Lowry,et al.  "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..

[7]  I. Ajzen The theory of planned behavior , 1991 .

[8]  Eirik Albrechtsen,et al.  The information security digital divide between information security managers and users , 2009, Comput. Secur..

[9]  Marcia J. Simmering,et al.  A Tale of Three Perspectives , 2009 .

[10]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[11]  Kuang-Wei Wen,et al.  Organizations' Information Security Policy Compliance: Stick or Carrot Approach? , 2012, J. Manag. Inf. Syst..

[12]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[13]  R. W. Rogers,et al.  Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .

[14]  Simon S. K. Lam,et al.  Instrumental values of organizational citizenship behavior for promotion: a field quasi-experiment. , 2000, The Journal of applied psychology.

[15]  David W. Gerbing,et al.  An Updated Paradigm for Scale Development Incorporating Unidimensionality and Its Assessment , 1988 .

[16]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[17]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[18]  Paul Benjamin Lowry,et al.  The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness , 2015, Inf. Syst. Res..

[19]  Alexandra Durcikova,et al.  What, I Shouldn't Have Done That? : The Influence of Training and Just-in-Time Reminders on Secure Behavior , 2013, ICIS.

[20]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..

[21]  Gerardine De Sanctis,et al.  Expectancy Theory as an Explanation of Voluntary Use of a Decision-Support System: , 1983 .

[22]  Tejaswini Herath,et al.  Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..

[23]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[24]  L. J. Williams,et al.  An Alternative Approach to Method Effects by Using Latent-Variable Models: Applications in Organizational Behavior Research , 1994 .

[25]  Jan H. P. Eloff,et al.  Information security: The moving target , 2009, Comput. Secur..

[26]  Tamara Dinev,et al.  Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..

[27]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[28]  Eirik Albrechtsen,et al.  Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study , 2010, Comput. Secur..

[29]  Tom L. Roberts,et al.  Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..

[30]  Jintae Lee,et al.  A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..

[31]  William Buhrow,et al.  Does survey format influence self-disclosure on sensitive question items? , 2012, Comput. Hum. Behav..

[32]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[33]  Varun Grover,et al.  An Application of Expectancy Theory for Assessing User Motivation to Utilize an Expert System , 1992, J. Manag. Inf. Syst..

[34]  Kenneth J. Harris,et al.  The moderating effects of political skill on the perceived politics–outcome relationships , 2011 .

[35]  Changquan Jiao,et al.  Leadership and Organizational Citizenship Behavior: OCB-Specific Meanings as Mediators , 2011 .

[36]  Cheolho Yoon,et al.  Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms , 2013, Inf. Technol. People.

[37]  C. Dweck The role of expectations and attributions in the alleviation of learned helplessness. , 1975 .

[38]  Kuang-Wei Wen,et al.  Impacts of Comprehensive Information Security Programs on Information Security Culture , 2015, J. Comput. Inf. Syst..

[39]  Jeffrey D. Wall,et al.  Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy , 2013 .

[40]  Tom L. Roberts,et al.  The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets , 2015, J. Manag. Inf. Syst..

[41]  Paul E. Levy,et al.  The Importance of Instrumentality Beliefs in the Prediction of Organizational Citizenship Behaviors , 2001 .

[42]  Donald M. Truxillo,et al.  Development and examination of an expectancy-based measure of test-taking motivation. , 2000, The Journal of applied psychology.

[43]  Merrill Warkentin,et al.  Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..

[44]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[45]  Elizabeth Wolfe Morrison,et al.  Role Definitions and Organizational Citizenship Behavior: The Importance of the Employee's Perspective , 1994 .

[46]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[47]  Tom L. Roberts,et al.  Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals , 2017, Comput. Hum. Behav..

[48]  Mikko T. Siponen,et al.  Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches , 2011, J. Assoc. Inf. Syst..

[49]  Laurie J. Kirsch,et al.  If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security , 2009, Eur. J. Inf. Syst..

[50]  Mo Adam Mahmood,et al.  Compliance with Information Security Policies: An Empirical Investigation , 2010, Computer.

[51]  Paul Benjamin Lowry,et al.  Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..

[52]  I. Ajzen,et al.  Attitudes and normative beliefs as factors influencing behavioral intentions. , 1972 .

[53]  Gerardine DeSanctis,et al.  CONTINUITY IN MIS/DSS LABORATORY RESEARCH: THE CASE FOR A COMMON GAMING SIMULATOR* , 1983 .

[54]  Tejaswini Herath,et al.  A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..

[55]  Mikko T. Siponen,et al.  A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..

[56]  Tero Vartiainen,et al.  What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..

[57]  Tejaswini Herath,et al.  Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..

[58]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[59]  Michael Ahearne,et al.  Some Possible Antecedents and Consequences of In-Role and Extra-Role Salesperson Performance , 1998 .

[60]  A. Hovav,et al.  Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures , 2009 .

[61]  Tom Roberts,et al.  Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective , 2015, AIS Trans. Hum. Comput. Interact..

[62]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[63]  W. V. Eerde,et al.  Vroom's expectancy models and work-related criteria: A meta-analysis , 1996 .

[64]  Dan Jong Kim,et al.  A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate , 2013, 2013 46th Hawaii International Conference on System Sciences.

[65]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[66]  Chun Hui,et al.  Psychological contract and organizational citizenship behavior in China: investigating generalizability and instrumentality. , 2004, The Journal of applied psychology.

[67]  Jongwoo Kim,et al.  Incident-centered information security: Managing a strategic balance between prevention and response , 2014, Inf. Manag..

[68]  Ken H. Guo Security-related behavior in using information systems in the workplace: A review and synthesis , 2013, Comput. Secur..

[69]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[70]  Henri Barki,et al.  User Participation in Information Systems Security Risk Management , 2010, MIS Q..

[71]  Princely Ifinedo,et al.  Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..

[72]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[73]  Detmar W. Straub,et al.  Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture , 2008, J. Manag. Inf. Syst..

[74]  Dennis F. Galletta,et al.  The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..

[75]  Jie Zhang,et al.  Impact of perceived technical protection on security behaviors , 2009, Inf. Manag. Comput. Secur..

[76]  Jill E. Ellingson,et al.  Understanding Faking Behavior Through the Lens of Motivation: An Application of VIE Theory , 2011 .

[77]  C. Carver,et al.  Control theory: a useful conceptual framework for personality-social, clinical, and health psychology. , 1982, Psychological bulletin.

[78]  N. Feather Values, valences, and choice: The influences of values on the perceived attractiveness and choice of alternatives. , 1995 .

[79]  Paul Benjamin Lowry,et al.  Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies , 2015, Inf. Syst. J..

[80]  Tom L. Roberts,et al.  Organizational information security as a complex adaptive system: insights from three agent-based models , 2015, Information Systems Frontiers.