2006 Innovations in Information Technology 2006
DOI: 10.1109/innovations.2006.301907
|View full text |Cite
|
Sign up to set email alerts
|

Factors Influencing Protection Motivation and IS Security Policy Compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(30 citation statements)
references
References 13 publications
0
28
1
Order By: Relevance
“…There are only 11 studies examining actual behavior [22,24,25]. When it comes to measurement of actual behaviors, most studies used items such as, "I comply with the information security policy," but a few did not follow this approach.…”
Section: Methodological Evolvementmentioning
confidence: 99%
See 3 more Smart Citations
“…There are only 11 studies examining actual behavior [22,24,25]. When it comes to measurement of actual behaviors, most studies used items such as, "I comply with the information security policy," but a few did not follow this approach.…”
Section: Methodological Evolvementmentioning
confidence: 99%
“…Many of these factors relate to the consequentialism ethical perspective, where factors such as perceived threat vulnerability (employees' perceptions of probability of harm occurring to organizations resulting from IS policy noncompliance behaviors) and perceived threat severity (employees' perceptions of severity of harm to organizations resulting from IS policy noncompliance behaviors if harm has occurred) [2,5,9,[19][20][21][22][23][24][25]. Concurrently, others have studied factors with the deontological focus, such as moral obligation (employees' perceptions of severity of harm to organization resulting from their noncompliance behaviors if harm has occurred) [23,[26][27][28][29][30].…”
Section: Critical Review Of Is Literaturementioning
confidence: 99%
See 2 more Smart Citations
“…• Norms -Change behaviour by informing people of the behaviours of others, emphasizing the descriptive norm and using human tendencies to imitate others' behaviours, to encourage particular behaviours [56].…”
Section: A Behaviour-change In Information Securitymentioning
confidence: 99%