Semantic Filter
show all semantic filters
Found 22 articles
  • Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Burns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin; Fuller, Bryan

    Abstract: Despite widespread agreement among practitioners and academicians that organizat ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: IT security data security anonymity organizational control password

    Methods: theory development partial least squares path modeling factor analysis data transformation PLS tool

    Theories: control theory deterrence theory

  • The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis

    PDF

    2021 | Information & Management | Citations: 0

    Authors: Jaeger, Lennart; Eckhardt, Andreas; Kroenung, Julia

    Abstract: This paper offers a new perspective on the effectiveness of sanctions in influen ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: security policy information security policy compliance cloud computing data security information security management

    Methods: partial least squares regression survey partial least squares path modeling statistical hypothesis test PLS tool

    Theories: deterrence theory

  • Anger or fear? Effects of discrete emotions on employee’s computer-related deviant behavior

    PDF

    2020 | Information & Management | Citations: 0

    Authors: Xu, Feng; Luo, Xin (Robert); Hsu, Carol

    Abstract: Security research on the employees’ expressive motives in committing computer-re ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: behavioral intention security policy IT security cybersecurity behavior IT security threat

    Methods: survey literature study theoretical contribution self reported survey theory development

    Theories: deterrence theory fairness theory organizational behavior theory affective events theory

  • Peers matter: The moderating role of social influence on information security policy compliance

    PDF

    2020 | Information Systems Journal | Citations: 30

    Authors: Yazdanmehr, Adel; Wang, Jingguo; Yang, Zhiyong

    Abstract: Information security in an organization largely depends on employee compliance w ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: social influence data security security policy intrinsic motivation communication service infrastructure

    Methods: survey descriptive statistic partial least squares regression literature study scale reliability

    Theories: contingency theory general deterrence theory deterrence theory

  • Moral Hazard in Compliance: The Impact of Moral Intensity and Competing Values

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Zheng, Dailin; Walter, Zhiping

    Abstract: This study highlights moral hazard in information systems security policy compl ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: moral hazard self efficacy accounting missing data data breach

    Methods: survey statistical hypothesis test computational algorithm confirmatory factor analysis data transformation

    Theories: deterrence theory theory of planned behavior

  • Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory

    2019 | Americas Conference on Information Systems | Citations: 6

    Authors: Lembcke, Tim-Benjamin; Masuch, Kristin; Trang, Simon; Hengstler, Sebastian; Plics, Patience; Pamuk, Mustafa

    Abstract: Information security has become an important aspect of contemporary information ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: organizational context IT skill IT security threat data security social norm

    Methods: survey partial least squares regression qualitative interview partial least squares path modeling Student's t-test

    Theories: deterrence theory social learning theory

  • Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Research

    PDF

    2019 | Journal of the Association for Information Systems | Citations: 22

    Authors: Aurigemma, Sal; Mattson, Thomas

    Abstract: The objective of our paper is to conceptually and empirically challenge the idea ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: password workstation IT security threat phishing self efficacy

    Methods: literature study survey survey design chi squared test case study

    Theories: theory of planned behavior protection motivation theory rational choice theory deterrence theory

  • Toward a Unified Model of Information Security Policy Compliance

    2018 | Management Information Systems Quarterly | Citations: 241

    Authors: Moody, Gregory D.; Siponen, Mikko; Pahnila, Seppo

    Abstract: Information systems security (ISS) behavioral research has produced different mo ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: password information security policy compliance cybersecurity behavior security policy IT policy

    Methods: survey data transformation factor analysis chi squared test theory development

    Theories: theory of interpersonal behavior balance theory theory of reasoned action deterrence theory general deterrence theory

  • Factors Influencing Employees’ Participation in Non-Malicious, Information Systems Security Deviant Behavior: Focus on Formal Control Mechanisms and Sanctions

    2017 | Americas Conference on Information Systems | Citations: 0

    Authors: Ifinedo, Princely; Idemudia, Efosa C

    Abstract: This study examined factors influencing employees’ participation in non-maliciou ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: cybersecurity behavior security policy IT security information system use data security

    Methods: partial least squares regression survey descriptive statistic partial least squares path modeling pilot survey

    Theories: deterrence theory

  • To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls

    PDF

    2017 | Journal of Management Information Systems | Citations: 63

    Authors: Khansa, Lara; Kuem, Jungwon; Siponen, Mikko; Kim, Sung S.

    Abstract: We investigate the changing causal relationships between cyberloafing behavior a ... Expand

    Semantic filters: common-method variance deterrence theory

    Topics: organizational control self efficacy electronic mail societal context productivity

    Methods: survey conceptual modelling chi squared test experimental group structural equation modeling

    Theories: deterrence theory social learning theory