메뉴 건너뛰기




Volumn 51, Issue 2, 2014, Pages 217-224

Employees' adherence to information security policies: An exploratory field study

Author keywords

Attitude; Cognitive Evaluation Theory; Employees' compliance of information systems security policies; Information security; Information security policy compliance; Information systems security; Information systems security policies; Moderating effect; Multi theory based model to explain employees' adherence to information security policies; Normative beliefs; Protection Motivation Theory; Response efficacy; Rewards; Self efficacy; SEM based analysis of the model; Theory of Reasoned Action; Threat appraisal; Work experience

Indexed keywords

ATTITUDE; COGNITIVE EVALUATION THEORY; INFORMATION SECURITY POLICIES; INFORMATION SYSTEMS SECURITY; INFORMATION SYSTEMS SECURITY POLICIES; MODERATING EFFECT; NORMATIVE BELIEFS; PROTECTION MOTIVATION THEORY; RESPONSE EFFICACY; REWARDS; SELF EFFICACY; THEORY OF REASONED ACTION; THREAT APPRAISAL; WORK EXPERIENCE;

EID: 84891789669     PISSN: 03787206     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.im.2013.08.006     Document Type: Article
Times cited : (418)

References (14)
  • 1
    • 2642549662 scopus 로고    scopus 로고
    • Computer and risky computing practices: A rational choice perspective
    • K. Aytes, and T. Connolly Computer and risky computing practices: a rational choice perspective J. Organ. End User Comput. 16 2 2004 22 40
    • (2004) J. Organ. End User Comput. , vol.16 , Issue.2 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 2
    • 32844472020 scopus 로고    scopus 로고
    • Achievement-based rewards and intrinsic motivation: A test of cognitive mediators
    • DOI 10.1037/0022-0663.97.4.641
    • J. Cameron, W.D. Pierce, K.M. Banko, and A. Gear Achievement-based rewards and intrinsic motivation: a test of cognitive mediators J. Educ. Psychol. 97 4 2005 641 655 (Pubitemid 43250907)
    • (2005) Journal of Educational Psychology , vol.97 , Issue.4 , pp. 641-655
    • Cameron, J.1    Pierce, W.D.2    Banko, K.M.3    Gear, A.4
  • 3
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • J. D'Arcy, A. Hovav, and D. Galletta User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach Inf. Syst. Res. 17 1 2009 79 98
    • (2009) Inf. Syst. Res. , vol.17 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 4
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations Eur. J. Inf. Syst. 18 2 2009 106 125
    • (2009) Eur. J. Inf. Syst. , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 5
    • 84859105508 scopus 로고    scopus 로고
    • Does culture really matter? A cross-cultural analysis of security countermeasure effectiveness based on deterrence theory
    • A. Hovav, and J. D'Arcy Does culture really matter? A cross-cultural analysis of security countermeasure effectiveness based on deterrence theory Inf. Manage. 49 2 2012 99 110
    • (2012) Inf. Manage. , vol.49 , Issue.2 , pp. 99-110
    • Hovav, A.1    D'Arcy, J.2
  • 6
    • 80054707541 scopus 로고    scopus 로고
    • Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
    • S. Jai-Yeol Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies Inf. Manage. 48 7 2011 296 302
    • (2011) Inf. Manage. , vol.48 , Issue.7 , pp. 296-302
    • Jai-Yeol, S.1
  • 7
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • A.C. Johnston, and M. Warkentin Fear appeals and information security behaviors: an empirical study MIS Q. 34 3 2010 549 566
    • (2010) MIS Q. , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 8
    • 80052902327 scopus 로고    scopus 로고
    • Towards a meta-theory for designing information systems security training approaches
    • M. Karjalainen, and M. Siponen Towards a meta-theory for designing information systems security training approaches J. Assoc. Inf. Syst. 12 8 2011 518 555
    • (2011) J. Assoc. Inf. Syst. , vol.12 , Issue.8 , pp. 518-555
    • Karjalainen, M.1    Siponen, M.2
  • 9
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Inf. Manage. 41 2004 597 607
    • (2004) Inf. Manage. , vol.41 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 10
    • 38549114187 scopus 로고    scopus 로고
    • How habit limits the predictive power of intention: The case of information systems continuance
    • M. Limayem, S.G. Hirt, and C.M.K. Cheung How habit limits the predictive power of intention: the case of information systems continuance MIS Q. 30 2 2007 705 737 (Pubitemid 351153309)
    • (2007) MIS Quarterly: Management Information Systems , vol.31 , Issue.4 , pp. 705-737
    • Limayem, M.1    Hirt, S.G.2    Cheung, C.M.K.3
  • 11
    • 0141907688 scopus 로고    scopus 로고
    • Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies
    • DOI 10.1037/0021-9010.88.5.879
    • P.M. Podsakoff, S.B. MacKenzie, J.Y. Lee, and N.P. Podsakoff Common method bias in behavioral research: a critical review of the literature and recommended remedies J. Appl. Psychol. 88 5 2003 879 903 (Pubitemid 37239703)
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Lee, J.-Y.3    Podsakoff, N.P.4
  • 12
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violation
    • M. Siponen, and A. Vance Neutralization: new insights into the problem of employee information systems security policy violation MIS Q. 34 3 2010 487 502
    • (2010) MIS Q. , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 13
    • 67651102640 scopus 로고    scopus 로고
    • Information security management standards: Problems and solutions
    • M. Siponen, and R. Willison Information security management standards: problems and solutions Inf. Manage. 46 5 2009 267 270
    • (2009) Inf. Manage. , vol.46 , Issue.5 , pp. 267-270
    • Siponen, M.1    Willison, R.2
  • 14
    • 12244267312 scopus 로고    scopus 로고
    • Development and validation of an instrument to measure user perceived service quality of information presenting Web portals
    • DOI 10.1016/j.im.2004.03.001, PII S0378720604000734
    • Z. Yang, S. Cai, Z. Zhou, and N. Zhou Development and validation of an instrument to measure user perceived service quality of information presenting Web portals Inf. Manage. 42 4 2005 575 589 (Pubitemid 40114727)
    • (2005) Information and Management , vol.42 , Issue.4 , pp. 575-589
    • Yang, Z.1    Cai, S.2    Zhou, Z.3    Zhou, N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.