2023 | Information Systems Research | Citations: 0
Authors: Burns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin; Fuller, Bryan
Abstract: Despite widespread agreement among practitioners and academicians that organizat ... Expand
Semantic filters: common-method variance deterrence theory
Topics: IT security data security anonymity organizational control password
Methods: theory development partial least squares path modeling factor analysis data transformation PLS tool
Theories: control theory deterrence theory
2021 | Information & Management | Citations: 0
Authors: Jaeger, Lennart; Eckhardt, Andreas; Kroenung, Julia
Abstract: This paper offers a new perspective on the effectiveness of sanctions in influen ... Expand
Semantic filters: common-method variance deterrence theory
Topics: security policy information security policy compliance cloud computing data security information security management
Methods: partial least squares regression survey partial least squares path modeling statistical hypothesis test PLS tool
Theories: deterrence theory
2020 | Information & Management | Citations: 0
Authors: Xu, Feng; Luo, Xin (Robert); Hsu, Carol
Abstract: Security research on the employees’ expressive motives in committing computer-re ... Expand
Semantic filters: common-method variance deterrence theory
Topics: behavioral intention security policy IT security cybersecurity behavior IT security threat
Methods: survey literature study theoretical contribution self reported survey theory development
Theories: deterrence theory fairness theory organizational behavior theory affective events theory
2020 | Information Systems Journal | Citations: 30
Authors: Yazdanmehr, Adel; Wang, Jingguo; Yang, Zhiyong
Abstract: Information security in an organization largely depends on employee compliance w ... Expand
Semantic filters: common-method variance deterrence theory
Topics: social influence data security security policy intrinsic motivation communication service infrastructure
Methods: survey descriptive statistic partial least squares regression literature study scale reliability
Theories: contingency theory general deterrence theory deterrence theory
2020 | Americas Conference on Information Systems | Citations: 0
Authors: Zheng, Dailin; Walter, Zhiping
Abstract: This study highlights moral hazard in information systems security policy compl ... Expand
Semantic filters: common-method variance deterrence theory
Topics: moral hazard self efficacy accounting missing data data breach
Methods: survey statistical hypothesis test computational algorithm confirmatory factor analysis data transformation
Theories: deterrence theory theory of planned behavior
2019 | Americas Conference on Information Systems | Citations: 6
Authors: Lembcke, Tim-Benjamin; Masuch, Kristin; Trang, Simon; Hengstler, Sebastian; Plics, Patience; Pamuk, Mustafa
Abstract: Information security has become an important aspect of contemporary information ... Expand
Semantic filters: common-method variance deterrence theory
Topics: organizational context IT skill IT security threat data security social norm
Methods: survey partial least squares regression qualitative interview partial least squares path modeling Student's t-test
Theories: deterrence theory social learning theory
2019 | Journal of the Association for Information Systems | Citations: 22
Authors: Aurigemma, Sal; Mattson, Thomas
Abstract: The objective of our paper is to conceptually and empirically challenge the idea ... Expand
Semantic filters: common-method variance deterrence theory
Topics: password workstation IT security threat phishing self efficacy
Methods: literature study survey survey design chi squared test case study
Theories: theory of planned behavior protection motivation theory rational choice theory deterrence theory
2018 | Management Information Systems Quarterly | Citations: 241
Authors: Moody, Gregory D.; Siponen, Mikko; Pahnila, Seppo
Abstract: Information systems security (ISS) behavioral research has produced different mo ... Expand
Semantic filters: common-method variance deterrence theory
Topics: password information security policy compliance cybersecurity behavior security policy IT policy
Methods: survey data transformation factor analysis chi squared test theory development
Theories: theory of interpersonal behavior balance theory theory of reasoned action deterrence theory general deterrence theory
2017 | Americas Conference on Information Systems | Citations: 0
Authors: Ifinedo, Princely; Idemudia, Efosa C
Abstract: This study examined factors influencing employees’ participation in non-maliciou ... Expand
Semantic filters: common-method variance deterrence theory
Topics: cybersecurity behavior security policy IT security information system use data security
Methods: partial least squares regression survey descriptive statistic partial least squares path modeling pilot survey
Theories: deterrence theory
2017 | Journal of Management Information Systems | Citations: 63
Authors: Khansa, Lara; Kuem, Jungwon; Siponen, Mikko; Kim, Sung S.
Abstract: We investigate the changing causal relationships between cyberloafing behavior a ... Expand
Semantic filters: common-method variance deterrence theory
Topics: organizational control self efficacy electronic mail societal context productivity
Methods: survey conceptual modelling chi squared test experimental group structural equation modeling
Theories: deterrence theory social learning theory