2023 | Journal of Information Technology | Citations: 0
Authors: Liang, Nan (Peter); Hirschheim, Rudy; Luo, Xin (Robert); Hollingsworth, Hayden
Abstract: Information security (InfoSec)–related behaviors have been defined in many diffe ... Expand
Semantic filters: information security policy violation
Topics: security policy organizational context decision making IT security bring your own device
Methods: theory development literature sample post-hoc analysis qualitative content analysis structured literature research
Theories: agency theory
2022 | Journal of Management Information Systems | Citations: 0
Authors: Ghasemaghaei, Maryam; Turel, Ofir
Abstract: We aim to understand why employees take information technology (IT)-mediated sho ... Expand
Semantic filters: information security policy violation
Topics: digital dashboard task productivity analytical information system information system use accounting
Methods: experiment delphi study survey post-hoc analysis theoretical contribution
Theories: goal setting theory ego depletion theory
2022 | Information Systems Journal | Citations: 4
Authors: Kim, Jongwoo; Park, Eun Hee; Park, Young Soon; Chun, Kyung Hee; Wiles, Lynn L.
Abstract: Regulations, such as the Health Insurance Portability and Accountability Act (HI ... Expand
Semantic filters: information security policy violation
Topics: healthcare data IT security threat data security health information system decision making
Methods: experiment partial least squares regression survey theory development PLS tool
2022 | Information Systems Frontiers | Citations: 0
Authors: Offei, Martin; Andoh-Baidoo, Francis Kofi; Ayaburi, Emmanuel W.; Asamoah, David
Abstract: Online romance fraud (ORF) is a growing concern with such serious negative conse ... Expand
Semantic filters: information security policy violation
Topics: criminality internet technology online dating internet fraud information security policy violation
Methods: psychometrics structural equation modeling theory development data transformation SEM tool
Theories: neutralization theory
2021 | European Conference On Information Systems | Citations: 0
Authors: Frank, Muriel
Abstract: Employees who do not adhere to security policies and regulations are a major co ... Expand
Semantic filters: information security policy violation
Topics: information security policy violation data security IT security threat security policy organizational context
Methods: survey factor analysis data transformation structural equation modeling chi squared test
Theories: coordination theory neutralization theory
2021 | Journal of the Association for Information Systems | Citations: 0
Authors: Trinkle, Bradley; Warkentin, Merrill; Malimage, Kalana; Raddatz, Nirmalee
Abstract: Extant research has shown that neutralization processes can enable potential IS ... Expand
Semantic filters: information security policy violation
Topics: behavioral intention accounting IT career IT security threat accounting information system
Methods: survey hierarchical linear modeling statistical hypothesis test experiment experimental design
Theories: deterrence theory neutralization theory behavioral theory general deterrence theory protection motivation theory
2020 | Information Systems Journal | Citations: 30
Authors: Yazdanmehr, Adel; Wang, Jingguo; Yang, Zhiyong
Abstract: Information security in an organization largely depends on employee compliance w ... Expand
Semantic filters: information security policy violation
Topics: social influence data security security policy intrinsic motivation communication service infrastructure
Methods: survey descriptive statistic partial least squares regression literature study scale reliability
Theories: contingency theory general deterrence theory deterrence theory
2019 | Journal of the Association for Information Systems | Citations: 22
Authors: Aurigemma, Sal; Mattson, Thomas
Abstract: The objective of our paper is to conceptually and empirically challenge the idea ... Expand
Semantic filters: information security policy violation
Topics: password workstation IT security threat phishing self efficacy
Methods: literature study survey survey design chi squared test case study
Theories: theory of planned behavior protection motivation theory rational choice theory deterrence theory
2019 | Information Systems Management | Citations: 0
Authors: Connolly, Lena Y.; Lang, Michael; Wall, David S.
Abstract: This study explores how aspects of perceived national culture affect the informa ... Expand
Semantic filters: information security policy violation
Topics: data security national culture cybersecurity behavior laptop computer information security practice
Methods: qualitative interview cross sectional research personal interview constant comparative analysis qualitative content analysis
2019 | Management Information Systems Quarterly | Citations: 0
Authors: Cram, W. Alec; D’Arcy, John; Proudfoot, Jeffrey G.
Abstract: A rich stream of research has identified numerous antecedents to employee compli ... Expand
Semantic filters: information security policy violation
Topics: information security policy compliance security policy IT security IT security threat self efficacy
Methods: meta analysis literature sample literature study cross sectional research survey design
Theories: theory of interpersonal behavior rational choice theory