Response biases in policy compliance research

[1]  Tamara Dinev,et al.  Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..

[2]  Catherine E. Connelly,et al.  Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model , 2011, J. Manag. Inf. Syst..

[3]  Eirik Albrechtsen,et al.  The information security digital divide between information security managers and users , 2009, Comput. Secur..

[4]  Ilse De Bourdeaudhuij,et al.  Addressing overreporting on the International Physical Activity Questionnaire (IPAQ) telephone survey with a population sample , 2003, Public Health Nutrition.

[5]  Brian J. Taylor,et al.  Factorial Surveys: Using Vignettes to Study Professional Judgement , 2005 .

[6]  D. R. Chase,et al.  The accuracy of self-reported participation rates. , 1983 .

[7]  Princely Ifinedo,et al.  Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines? , 2016, Inf. Syst. Manag..

[8]  Princely Ifinedo,et al.  Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..

[9]  Peter B. Smith Acquiescent Response Bias as an Aspect of Cultural Communication Style , 2004 .

[10]  Rathindra Sarathy,et al.  Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance , 2014, Inf. Syst. J..

[11]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[12]  Tom L. Roberts,et al.  The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets , 2015, J. Manag. Inf. Syst..

[13]  S. Stryker,et al.  The Causal Ordering of Prominence and Salience in Identity Theory , 2014, Social psychology quarterly.

[14]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[15]  Mikko T. Siponen,et al.  IS Security Policy Violations: A Rational Choice Perspective , 2012, J. Organ. End User Comput..

[16]  Teodor Sommestad,et al.  Variables influencing information security policy compliance: A systematic review of quantitative studies , 2014, Inf. Manag. Comput. Secur..

[17]  Anne-Wil Harzing Response Styles in Cross-national Survey Research , 2006 .

[18]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[19]  D. Marlowe,et al.  A new scale of social desirability independent of psychopathology. , 1960, Journal of consulting psychology.

[20]  Wenli Li,et al.  Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory , 2014, Comput. Hum. Behav..

[21]  Tejaswini Herath,et al.  Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..

[22]  Ying Li,et al.  Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory , 2013, Comput. Secur..

[23]  Teodor Sommestad,et al.  The sufficiency of the theory of planned behavior for explaining information security policy compliance , 2015, Inf. Comput. Secur..

[24]  R Ballard,et al.  Short Forms of the Marlowe-Crowne Social Desirability Scale , 1992, Psychological reports.

[25]  Jai-Yeol Son,et al.  Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies , 2011, Inf. Manag..

[26]  Patrick Y. K. Chau,et al.  Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach , 2014, Journal of Business Ethics.

[27]  J. Delamater,et al.  Measurement Directiveness as a Cause of Response Bias , 2016 .

[28]  J. Delamater,et al.  Lies, Damned Lies, and Survey Self-Reports? Identity as a Cause of Measurement Bias , 2016, Social psychology quarterly.

[29]  Mo Adam Mahmood,et al.  Employees' adherence to information security policies: An exploratory field study , 2014, Inf. Manag..

[30]  V. Grover,et al.  An assessment of survey research in POM: from constructs to theory , 1998 .

[31]  Chaim Noy,et al.  Sampling Knowledge: The Hermeneutics of Snowball Sampling in Qualitative Research , 2008 .

[32]  P. Cronin,et al.  Undertaking a literature review: a step-by-step approach. , 2008, British journal of nursing.

[33]  Steven Furnell,et al.  Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..

[34]  Bonnie Brinton Anderson,et al.  Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG) , 2014, J. Assoc. Inf. Syst..

[35]  Lemuria Carter,et al.  Dispositional and situational factors: influences on information security policy violations , 2016, Eur. J. Inf. Syst..

[36]  P. Biernacki,et al.  Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .

[37]  Dan Jong Kim,et al.  A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate , 2014, IEEE Transactions on Professional Communication.

[38]  Roberto J. Mejias,et al.  Nontechnical Deterrence Effects of Mild and Severe Internet Use Policy Reminders in Reducing Employee Internet Abuse , 2016, Int. J. Hum. Comput. Interact..