Semantic Filter
show all semantic filters
Found 40 articles
  • Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective

    PDF

    2023 | Journal of Information Technology | Citations: 0

    Authors: Liang, Nan (Peter); Hirschheim, Rudy; Luo, Xin (Robert); Hollingsworth, Hayden

    Abstract: Information security (InfoSec)–related behaviors have been defined in many diffe ... Expand

    Semantic filters: information security policy violation

    Topics: security policy organizational context decision making IT security bring your own device

    Methods: theory development literature sample post-hoc analysis qualitative content analysis structured literature research

    Theories: agency theory

  • Why Do Data Analysts Take IT-Mediated Shortcuts? An Ego-Depletion Perspective

    PDF

    2022 | Journal of Management Information Systems | Citations: 0

    Authors: Ghasemaghaei, Maryam; Turel, Ofir

    Abstract: We aim to understand why employees take information technology (IT)-mediated sho ... Expand

    Semantic filters: information security policy violation

    Topics: digital dashboard task productivity analytical information system information system use accounting

    Methods: experiment delphi study survey post-hoc analysis theoretical contribution

    Theories: goal setting theory ego depletion theory

  • Prosocial rule breaking on health information security at healthcare organisations in South Korea

    PDF

    2022 | Information Systems Journal | Citations: 4

    Authors: Kim, Jongwoo; Park, Eun Hee; Park, Young Soon; Chun, Kyung Hee; Wiles, Lynn L.

    Abstract: Regulations, such as the Health Insurance Portability and Accountability Act (HI ... Expand

    Semantic filters: information security policy violation

    Topics: healthcare data IT security threat data security health information system decision making

    Methods: experiment partial least squares regression survey theory development PLS tool

  • How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?

    PDF

    2022 | Information Systems Frontiers | Citations: 0

    Authors: Offei, Martin; Andoh-Baidoo, Francis Kofi; Ayaburi, Emmanuel W.; Asamoah, David

    Abstract: Online romance fraud (ORF) is a growing concern with such serious negative conse ... Expand

    Semantic filters: information security policy violation

    Topics: criminality internet technology online dating internet fraud information security policy violation

    Methods: psychometrics structural equation modeling theory development data transformation SEM tool

    Theories: neutralization theory

  • Combatting the Neutralization of Security Policy Violations: Insights from the Healthcare Sector

    2021 | European Conference On Information Systems | Citations: 0

    Authors: Frank, Muriel

    Abstract: Employees who do not adhere to security policies and regulations are a major co ... Expand

    Semantic filters: information security policy violation

    Topics: information security policy violation data security IT security threat security policy organizational context

    Methods: survey factor analysis data transformation structural equation modeling chi squared test

    Theories: coordination theory neutralization theory

  • High-Risk Deviant Decisions: Does Neutralization Still Play a Role?

    PDF

    2021 | Journal of the Association for Information Systems | Citations: 0

    Authors: Trinkle, Bradley; Warkentin, Merrill; Malimage, Kalana; Raddatz, Nirmalee

    Abstract: Extant research has shown that neutralization processes can enable potential IS ... Expand

    Semantic filters: information security policy violation

    Topics: behavioral intention accounting IT career IT security threat accounting information system

    Methods: survey hierarchical linear modeling statistical hypothesis test experiment experimental design

    Theories: deterrence theory neutralization theory behavioral theory general deterrence theory protection motivation theory

  • Peers matter: The moderating role of social influence on information security policy compliance

    PDF

    2020 | Information Systems Journal | Citations: 30

    Authors: Yazdanmehr, Adel; Wang, Jingguo; Yang, Zhiyong

    Abstract: Information security in an organization largely depends on employee compliance w ... Expand

    Semantic filters: information security policy violation

    Topics: social influence data security security policy intrinsic motivation communication service infrastructure

    Methods: survey descriptive statistic partial least squares regression literature study scale reliability

    Theories: contingency theory general deterrence theory deterrence theory

  • Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Research

    PDF

    2019 | Journal of the Association for Information Systems | Citations: 22

    Authors: Aurigemma, Sal; Mattson, Thomas

    Abstract: The objective of our paper is to conceptually and empirically challenge the idea ... Expand

    Semantic filters: information security policy violation

    Topics: password workstation IT security threat phishing self efficacy

    Methods: literature study survey survey design chi squared test case study

    Theories: theory of planned behavior protection motivation theory rational choice theory deterrence theory

  • Information Security Behavior: A Cross-Cultural Comparison of Irish and US Employees

    PDF

    2019 | Information Systems Management | Citations: 0

    Authors: Connolly, Lena Y.; Lang, Michael; Wall, David S.

    Abstract: This study explores how aspects of perceived national culture affect the informa ... Expand

    Semantic filters: information security policy violation

    Topics: data security national culture cybersecurity behavior laptop computer information security practice

    Methods: qualitative interview cross sectional research personal interview constant comparative analysis qualitative content analysis

  • Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance

    PDF

    2019 | Management Information Systems Quarterly | Citations: 0

    Authors: Cram, W. Alec; D’Arcy, John; Proudfoot, Jeffrey G.

    Abstract: A rich stream of research has identified numerous antecedents to employee compli ... Expand

    Semantic filters: information security policy violation

    Topics: information security policy compliance security policy IT security IT security threat self efficacy

    Methods: meta analysis literature sample literature study cross sectional research survey design

    Theories: theory of interpersonal behavior rational choice theory