메뉴 건너뛰기




Volumn 49, Issue 3-4, 2012, Pages 190-198

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory

Author keywords

Habit theory; Information security; Information security policy compliance; Protection Motivation Theory; Scenario methodology

Indexed keywords

COGNITIVE PROCESS; EMPIRICAL TEST; HABIT THEORY; INFORMATION SECURITY POLICIES; PROTECTION MOTIVATION THEORY; SCENARIO METHODOLOGY; SECURITY COMPLIANCE; SECURITY POLICY; SECURITY PROCEDURES;

EID: 84861093724     PISSN: 03787206     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.im.2012.04.002     Document Type: Article
Times cited : (571)

References (22)
  • 2
    • 72049101186 scopus 로고    scopus 로고
    • Interpretation of formative measurement in information systems research
    • R. Cenfetelli, and G. Bassellier Interpretation of formative measurement in information systems research MIS Quarterly 33 4 2009 689 708
    • (2009) MIS Quarterly , vol.33 , Issue.4 , pp. 689-708
    • Cenfetelli, R.1    Bassellier, G.2
  • 3
    • 29444460597 scopus 로고    scopus 로고
    • A practical guide to factorial validity using PLS-graph: Tutorial and annotated example
    • Gefen, and Straub A practical guide to factorial validity using PLS-graph: tutorial and annotated example Communications of the Association for Information Systems 16 5 2005 91 109
    • (2005) Communications of the Association for Information Systems , vol.16 , Issue.5 , pp. 91-109
    • Gefen1    Straub2
  • 4
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations European Journal of Information Systems 18 2 2009 106 125
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 5
    • 84859105508 scopus 로고    scopus 로고
    • Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
    • A. Hovav, and J. D'Arcy Applying an extended model of deterrence across cultures: an investigation of information systems misuse in the U.S. and South Korea Information and Management 49 2 2012 99 110
    • (2012) Information and Management , vol.49 , Issue.2 , pp. 99-110
    • Hovav, A.1    D'Arcy, J.2
  • 6
    • 80054707541 scopus 로고    scopus 로고
    • Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
    • Jai-Yeol, and Son Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies Information and Management 48 7 2011 296 302
    • (2011) Information and Management , vol.48 , Issue.7 , pp. 296-302
    • Jai-Yeol1    Son2
  • 7
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • A. Johnston, and M. Warkentin Fear appeals and information security behaviors: an empirical study MIS Quarterly 34 3 2010 549 566
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.1    Warkentin, M.2
  • 8
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Information and Management 41 5 2004 597 607
    • (2004) Information and Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 9
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • S.M. Lee, S.G. Lee, and S. Yoo An integrative model of computer abuse based on social control and general deterrence theories Information and Management 41 2004 707 718
    • (2004) Information and Management , vol.41 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 10
    • 12444325211 scopus 로고    scopus 로고
    • Force of habit and information systems usage: Theory and initial validation
    • M. Limayem, and S.G. Hirt Force of habit and information systems usage: theory and initial validation Journal of the AIS 4 1 2003 65 97
    • (2003) Journal of the AIS , vol.4 , Issue.1 , pp. 65-97
    • Limayem, M.1    Hirt, S.G.2
  • 11
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • L. Myyry, M. Siponen, S. Pahnila, T. Vartiainen, and A. Vance What levels of moral reasoning and values explain adherence to information security rules? An empirical study European Journal of Information Systems 18 2 2009 126 139
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 12
    • 69549083453 scopus 로고    scopus 로고
    • Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use
    • A. Ortiz de Guinea, and L.M. Markus Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use MIS Quarterly 33 3 2009 433 444
    • (2009) MIS Quarterly , vol.33 , Issue.3 , pp. 433-444
    • Ortiz De Guinea, A.1    Markus, L.M.2
  • 14
    • 33745320750 scopus 로고    scopus 로고
    • Control balance and exploitative corporate crime
    • N.L. Piquero, and A.R. Piquero Control balance and exploitative corporate crime Criminology 44 2 2006 397 430
    • (2006) Criminology , vol.44 , Issue.2 , pp. 397-430
    • Piquero, N.L.1    Piquero, A.R.2
  • 15
    • 1642602843 scopus 로고    scopus 로고
    • Projected offending and implications for heterotypic continuity
    • G. Pogarsky Projected offending and implications for heterotypic continuity Criminology 42 1 2004 111 135
    • (2004) Criminology , vol.42 , Issue.1 , pp. 111-135
    • Pogarsky, G.1
  • 16
    • 78650770842 scopus 로고    scopus 로고
    • Improving employees' compliance through information systems security training: An action research study
    • P. Puhakainen, and M. Siponen Improving employees' compliance through information systems security training: an action research study MIS Quarterly 34 4 2010 757 778
    • (2010) MIS Quarterly , vol.34 , Issue.4 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 17
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • M. Siponen, and A. Vance Neutralization: new insights into the problem of employee information systems security policy violations MIS Quarterly 34 3 2010 487 502
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 18
    • 67651102640 scopus 로고    scopus 로고
    • Information security management standards: Problems and solutions
    • M. Siponen, and R. Willison Information security management standards: problems and solutions Information and Management 46 5 2009 267 270
    • (2009) Information and Management , vol.46 , Issue.5 , pp. 267-270
    • Siponen, M.1    Willison, R.2
  • 19
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • J. Stanton, K. Stam, P. Mastrangelo, and J. Jolton Analysis of end user security behaviors Computers and Security 24 2 2005 124 133 (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 20
    • 0141981362 scopus 로고    scopus 로고
    • Reflections on Past Behavior: A Self-Report Index of Habit Strength
    • Verplanken, and Orbell Reflections on past behavior: a self-report index of habit strength Journal of Applied Social Psychology 33 6 2003 1313 1330 (Pubitemid 37306730)
    • (2003) Journal of Applied Social Psychology , vol.33 , Issue.6 , pp. 1313-1330
    • Verplanken, B.1    Orbell, S.2
  • 22
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • M. Workman, W. Bommer, and D. Straub Security lapses and the omission of information security measures: a threat control model and empirical test Computers in Human Behavior 24 6 2008 2799 2816
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.