메뉴 건너뛰기




Volumn 28, Issue 1, 2014, Pages 209-226

Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84903215189     PISSN: 08887985     EISSN: 15587959     Source Type: Journal    
DOI: 10.2308/isys-50704     Document Type: Article
Times cited : (120)

References (45)
  • 1
    • 33750521955 scopus 로고
    • American Institute of Certified Public Accountants (AICPA). Section ET 301.01. New York, NY: AICPA
    • American Institute of Certified Public Accountants (AICPA). 1992. AICPA Code of Professional Conduct. Section ET 301.01. New York, NY: AICPA.
    • (1992) AICPA Code of Professional Conduct
  • 2
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
    • Anderson, C. L., and R. Agarwal. 2010. Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly 34 (3): 613-643.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 3
    • 0002545789 scopus 로고
    • Students as surrogates in behavioral accounting research: Some evidence
    • Ashton, R. H., and S. S. Kramer. 1980. Students as surrogates in behavioral accounting research: Some evidence. Journal of Accounting Research 18 (1): 1-15.
    • (1980) Journal of Accounting Research , vol.18 , Issue.1 , pp. 1-15
    • Ashton, R.H.1    Kramer, S.S.2
  • 4
    • 42649120373 scopus 로고    scopus 로고
    • The legacy of the technology acceptance model and a proposal for a paradigm shift
    • Bagozzi, R. P. 2007. The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems 8 (4): 244-254.
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.4 , pp. 244-254
    • Bagozzi, R.P.1
  • 5
    • 84903216170 scopus 로고    scopus 로고
    • Are you ready for BYOD?
    • In 34. Available at
    • Boomer, J. 2012. Are you ready for BYOD? In CPA Practice Advisor 34. Available at: http://www. cpapracticeadvisor.com/article/10707592/are-you-ready-for-byod
    • (2012) CPA Practice Advisor
    • Boomer, J.1
  • 6
    • 84901351947 scopus 로고    scopus 로고
    • Online instrument delivery and participant recruitment services: Emerging opportunities for behavioral accounting research
    • (forthcoming)
    • Brandon, D., J. H. Long, T. M. Loraas, J. M. Mueller-Phillips, and B. Vansant. 2014. Online instrument delivery and participant recruitment services: Emerging opportunities for behavioral accounting research. Behavioral Research in Accounting (forthcoming).
    • (2014) Behavioral Research in Accounting
    • Brandon, D.1    Long, J.H.2    Loraas, T.M.3    Mueller-Phillips, J.M.4    Vansant, B.5
  • 7
    • 79951775405 scopus 로고    scopus 로고
    • The effects of cognitive style and feedback type on performance in an internal control task
    • Bryant, S., U. Murthy, and P. Wheeler. 2009. The effects of cognitive style and feedback type on performance in an internal control task. Behavioral Research in Accounting 21 (1): 37-58.
    • (2009) Behavioral Research in Accounting , vol.21 , Issue.1 , pp. 37-58
    • Bryant, S.1    Murthy, U.2    Wheeler, P.3
  • 8
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., H. Cavusoglu, and I. Benbasat. 2010. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34 (3): 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 10
    • 0003095695 scopus 로고    scopus 로고
    • The partial least squares approach to structural equation modeling
    • In edited by Marcoulides, G. A., Hillsdale, NJ: Lawrence Erlbaum Associates
    • Chin, W. W. 1998. The partial least squares approach to structural equation modeling. In Modern Methods for Business Research, edited by Marcoulides, G. A., 295-336. Hillsdale, NJ: Lawrence Erlbaum Associates.
    • (1998) Modern Methods for Business Research , pp. 295-336
    • Chin, W.W.1
  • 13
    • 0001878819 scopus 로고
    • A paradigm for developing better measures of marketing constructs
    • Churchill, G. A. 1979. A paradigm for developing better measures of marketing constructs. Journal of Marketing Research 16 (1): 64-73.
    • (1979) Journal of Marketing Research , vol.16 , Issue.1 , pp. 64-73
    • Churchill, G.A.1
  • 14
    • 77951715681 scopus 로고    scopus 로고
    • Paper read at 43rd Hawaii International Conference on System Sciences (HICSS) (January 5-8). Available at
    • Crossler, R. E. 2010. Protection motivation theory: Understanding determinants to backing up personal data. Paper read at 43rd Hawaii International Conference on System Sciences (HICSS) (January 5-8). Available at: http://www.computer.org/csdl/proceedings/hicss/2010/3869/00/07-03-04-abs.html
    • (2010) Protection motivation theory: Understanding determinants to backing up personal data.
    • Crossler, R.E.1
  • 16
    • 83455211091 scopus 로고    scopus 로고
    • Betwixt and between? Bringing information systems and accounting systems research together
    • Debreceny, R. S. 2011. Betwixt and between? Bringing information systems and accounting systems research together. Journal of Information Systems 25 (2): 1-9.
    • (2011) Journal of Information Systems , vol.25 , Issue.2 , pp. 1-9
    • Debreceny, R.S.1
  • 17
    • 84903143731 scopus 로고    scopus 로고
    • Managing cybersecurity risks
    • (August)
    • Drew, J. 2012. Managing cybersecurity risks. Journal of Accountancy (August): 44-48.
    • (2012) Journal of Accountancy , pp. 44-48
    • Drew, J.1
  • 19
    • 33847707841 scopus 로고    scopus 로고
    • Are M.B.A. students a good proxy for nonprofessional investors?
    • Elliot, W. B., F. D. Hodge, J. J. Kennedy, and M. Pronk. 2007. Are M.B.A. students a good proxy for nonprofessional investors? The Accounting Review 82 (1): 139-168.
    • (2007) The Accounting Review , vol.82 , Issue.1 , pp. 139-168
    • Elliot, W.B.1    Hodge, F.D.2    Kennedy, J.J.3    Pronk, M.4
  • 20
    • 84903120512 scopus 로고    scopus 로고
    • Ernst & Young. Available at
    • Ernst & Young. 2012. Global Information Security Survey 2012. Available at: http://www.ey.com/ Publication/vwLUAssets/Fighting_to_close_the_gap:_2012_Global_Information_Security_Survey/ $FILE/2012_Global_Information_Security_Survey___Fighting_to_close_the_gap.pdf
    • (2012) Global Information Security Survey 2012
  • 21
    • 84903196906 scopus 로고    scopus 로고
    • SOPHOS. Available at
    • Eschelbeck, G., and D. Schwartzbert. 2012. BYOD Risks and Rewards. SOPHOS. Available at: http://www. Sophos.Com/En-Us/Security-News-Trends/Security-Trends/Byod-Risks-Rewards.Aspx
    • (2012) BYOD Risks and Rewards
    • Eschelbeck, G.1    Schwartzbert, D.2
  • 24
    • 84903178743 scopus 로고    scopus 로고
    • GFI. Available at
    • GFI. 2013. It's Time Businesses Wake Up to Mobile Security Reality. Available at: http://www. Threattracksecurity.Com/Documents/Business-Antivirus-White-Paper-Mobile-Security-Reality.pdf
    • (2013) It's Time Businesses Wake Up to Mobile Security Reality
  • 25
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., and H. Rao. 2009. Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems 18 (2): 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.2
  • 26
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    • Ifinedo, P. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security 31 (1): 83-95.
    • (2012) Computers and Security , vol.31 , Issue.1 , pp. 83-95
    • Ifinedo, P.1
  • 27
    • 84897751199 scopus 로고    scopus 로고
    • Information Systems Audit and Control Association (ISACA). Available at
    • Information Systems Audit and Control Association (ISACA). 2012. 2012 IT Risk/Reward Barometer: U.S. Consumer Edition. Available at: http://www.Isaca.Org/Sitecollectiondocuments/2012-Risk-Reward-Barometer-US-Consumer.pdf
    • (2012) 2012 IT Risk/Reward Barometer: U.S. Consumer Edition
  • 28
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, A. C., and M. Warkentin. 2010. Fear appeals and information security behaviors: An empirical study. MIS Quarterly 34 (3): 548-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 548-566
    • Johnston, A.C.1    Warkentin, M.2
  • 29
    • 67650166189 scopus 로고    scopus 로고
    • Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
    • Lee, Y., and K. R. Larsen. 2009. Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems 18 (2): 177-187.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 177-187
    • Lee, Y.1    Larsen, K.R.2
  • 30
    • 78650169218 scopus 로고    scopus 로고
    • Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective
    • Lee, Y. 2011. Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. Decision Support Systems 50 (2): 361-369.
    • (2011) Decision Support Systems , vol.50 , Issue.2 , pp. 361-369
    • Lee, Y.1
  • 31
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: A theoretical perspective
    • Liang, H., and Y. Xue. 2009. Avoidance of information technology threats: A theoretical perspective. MIS Quarterly 33 (1): 71-90.
    • (2009) MIS Quarterly , vol.33 , Issue.1 , pp. 71-90
    • Liang, H.1    Xue, Y.2
  • 32
    • 77955121478 scopus 로고    scopus 로고
    • Understanding security behaviors in personal computer usage: A threat avoidance perspective
    • Liang, H., and Y. Xue. 2010. Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems 11 (7): 394-413.
    • (2010) Journal of the Association for Information Systems , vol.11 , Issue.7 , pp. 394-413
    • Liang, H.1    Xue, Y.2
  • 34
    • 0033622371 scopus 로고    scopus 로고
    • Prediction and intervention in health-related behavior: A metaanalytic review of protection motivation theory
    • Milne, S., P. Sheeran, and S. Orbell. 2000. Prediction and intervention in health-related behavior: A metaanalytic review of protection motivation theory. Journal of Applied Social Psychology 30: 106-143.
    • (2000) Journal of Applied Social Psychology , vol.30 , pp. 106-143
    • Milne, S.1    Sheeran, P.2    Orbell, S.3
  • 36
    • 0033653826 scopus 로고    scopus 로고
    • Protection motivation and risk communication
    • Neuwirth, K., S. Dunwoody, and R. J. Griffin. 2000. Protection motivation and risk communication. Risk Analysis 20 (5): 721-734.
    • (2000) Risk Analysis , vol.20 , Issue.5 , pp. 721-734
    • Neuwirth, K.1    Dunwoody, S.2    Griffin, R.J.3
  • 37
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. 2003. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology 88 (5): 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    McKenzie, S.B.2    Lee, J.Y.3    Podsakoff, N.P.4
  • 38
    • 79961058252 scopus 로고    scopus 로고
    • Protecting personal information using generally accepted privacy principles (GAPP) and continuous control monitoring to enhance corporate governance
    • Prosch, M. 2008. Protecting personal information using generally accepted privacy principles (GAPP) and continuous control monitoring to enhance corporate governance. International Journal of Disclosure and Governance 5 (2): 153-166.
    • (2008) International Journal of Disclosure and Governance , vol.5 , Issue.2 , pp. 153-166
    • Prosch, M.1
  • 39
    • 38249025067 scopus 로고
    • The effect of audit documentation format on data collection
    • Purvis, S. E. C. 1989. The effect of audit documentation format on data collection. Accounting, Organizations and Society 14 (5/6): 551-563.
    • (1989) Accounting, Organizations and Society , vol.14 , Issue.5-6 , pp. 551-563
    • Purvis, S.E.C.1
  • 41
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R. W. 1975. A protection motivation theory of fear appeals and attitude change. Journal of Psychology: Interdisciplinary and Applied 91 (1): 93-114.
    • (1975) Journal of Psychology: Interdisciplinary and Applied , vol.91 , Issue.1 , pp. 93-114
    • Rogers, R.W.1
  • 42
    • 84903209179 scopus 로고    scopus 로고
    • Auditing the BYOD program
    • (February)
    • Semer, L. 2013. Auditing the BYOD program. Internal Auditor (February): 23-27.
    • (2013) Internal Auditor , pp. 23-27
    • Semer, L.1
  • 45
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M., W. H. Bommer, and D. W. Straub. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior 24 (6): 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.