2018
DOI: 10.1108/ics-09-2017-0066
|View full text |Cite
|
Sign up to set email alerts
|

Escalation of commitment as an antecedent to noncompliance with information security policy

Abstract: Purpose -This study aims to identify antecedents to noncompliance behavior influenced by decision contexts where investments in time, effort and resources are devoted to a taskreferred to as a task unlikely to be completed without violating the organization's information security policy (ISP).Design/methodology/approach -An empirical test of the suggested relationships in the proposed model was conducted through a field study using the survey method for data collection. Pre-tests, pre-study, main study and a f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(20 citation statements)
references
References 49 publications
(98 reference statements)
0
19
0
Order By: Relevance
“…The second one is the prospect theory, which suggests that individuals' intention to escalate on their decisions depends on the effect of sunk cost as well as their risk perceptions (Tversky and Khaneman, 1981). According to the prospect theory, individuals who have not experienced a previous loss are more likely to engage in riskseeking and even continue a failing course of action (Kajtazi et al, 2018).…”
Section: Escalation Of Commitmentmentioning
confidence: 99%
“…The second one is the prospect theory, which suggests that individuals' intention to escalate on their decisions depends on the effect of sunk cost as well as their risk perceptions (Tversky and Khaneman, 1981). According to the prospect theory, individuals who have not experienced a previous loss are more likely to engage in riskseeking and even continue a failing course of action (Kajtazi et al, 2018).…”
Section: Escalation Of Commitmentmentioning
confidence: 99%
“…Research showing how employees can influence the effectiveness of their respective organizations' cybersecurity efforts is well documented (Crossler et al, 2013;Warkentin & Willison, 2009). In fact, a substantial body of literature has examined the detrimental impacts of employee behavior like computer abuse (Lee et al, 2004;Straub & Nance, 1990;Willison & Warkentin, 2013), noncompliance with information security policies (ISPs; Gwebu et al, 2020;Kajtazi et al, 2018;Lowry & Moody, 2015), and shadow IT utilization (Silic & Back, 2014;Zimmermann & Rentrop, 2014). Conversely, research has also shown how employees can act as "protective stewards" of sensitive organizational assets as they actively attempt to defend their organizations from threats (Burns et al, 2018;Posey et al, 2013Posey et al, , 2015.…”
Section: Introductionmentioning
confidence: 99%
“…An understanding of security policy provides a new lens for learning noncompliance behavior. Employees sometimes sacrifice compliance with information security policies to complete their duties [34] Sharma, which states that organizational commitment influences behavioral intentions to comply with the Security Policy Information and employee status has an impact on organizational commitment [35]. This study argues that organizational commitment can improve compliance directly without influencing with user intention or employee status.…”
Section: Conceptual Frameworkmentioning
confidence: 88%