2012 45th Hawaii International Conference on System Sciences 2012
DOI: 10.1109/hicss.2012.49
|View full text |Cite
|
Sign up to set email alerts
|

A Composite Framework for Behavioral Compliance with Information Security Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
39
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 46 publications
(42 citation statements)
references
References 48 publications
1
39
0
2
Order By: Relevance
“…Therefore, it is important from both a theoretical and a practical standpoint to understand why this is the case. Existing literature offers certain hypotheses such as the software may be difficult to use, the real or perceived costs of using these applications may outweigh the benefits, a lack of self-confidence on behalf of the home end-user, and so on [4]. More research is needed to further our understanding of the low adoption rates of a category of applications that is, generally speaking, highly useful and purportedly easy to use.…”
Section: Background and Related Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, it is important from both a theoretical and a practical standpoint to understand why this is the case. Existing literature offers certain hypotheses such as the software may be difficult to use, the real or perceived costs of using these applications may outweigh the benefits, a lack of self-confidence on behalf of the home end-user, and so on [4]. More research is needed to further our understanding of the low adoption rates of a category of applications that is, generally speaking, highly useful and purportedly easy to use.…”
Section: Background and Related Literaturementioning
confidence: 99%
“…The most common theoretical perspectives are the theory of planned behavior, protection motivation theory, and general deterrence theory [4]. Most of the published research, irrespective of the theories being used, focuses on the first or second order antecedents of behavioral intentions with the assumption that there is a strong link between intentions and actual behaviors.…”
Section: Background and Related Literaturementioning
confidence: 99%
“…In InfoSec security domain, previous studies have supported that a person's intention to comply with an information system security procedure is influenced by his or her attitude, subjective norms, and perceived behavioral control [13]. Therefore, numerous information system security studies have used the TPB to examine InfoSec behavior and individual's behavioral compliance with InfoSec policies [6].…”
Section: Theory Of Reasoned Action and Theory Of Planned Behaviormentioning
confidence: 99%
“…Khan et al (2011) confirm the influence of knowledge on the behavior of people, which in turn leads to changes in attitudes and behavior in consciousness. Similarly, Aurigemma and Panko (2012) point out that the overall success of information security depends on the effective user behavior.…”
Section: Literature Reviewmentioning
confidence: 99%