2011
DOI: 10.1016/j.im.2011.07.002
|View full text |Cite
|
Sign up to set email alerts
|

Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
139
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 185 publications
(141 citation statements)
references
References 13 publications
1
139
1
Order By: Relevance
“…The existing studies in the IS security area that look into the behavioral aspects of the insiders have provided insights into the effects of insiders" dysfunctional behaviors on organizational IS assets. These can be seen in valuable work on IS security compliance/non-compliance behaviors [10][11][12][13][14][15][16][17][18][19][20] including motivations to comply with IS security policies [21][22][23][24], IS misuse [2,[25][26][27][28][29][30][31], and studies on computer abuse [32][33][34]. These IS security studies, however, have largely focused on nonmalicious and policy non-compliance behaviors [4,7].…”
Section: Introductionmentioning
confidence: 99%
“…The existing studies in the IS security area that look into the behavioral aspects of the insiders have provided insights into the effects of insiders" dysfunctional behaviors on organizational IS assets. These can be seen in valuable work on IS security compliance/non-compliance behaviors [10][11][12][13][14][15][16][17][18][19][20] including motivations to comply with IS security policies [21][22][23][24], IS misuse [2,[25][26][27][28][29][30][31], and studies on computer abuse [32][33][34]. These IS security studies, however, have largely focused on nonmalicious and policy non-compliance behaviors [4,7].…”
Section: Introductionmentioning
confidence: 99%
“…Ifinedo (2012) found that self-efficacy, response efficacy and a sense of social norms were some of the important elements for following cyber safety policies. Explicit policies were found to be helpful [21] while punishments for violating safety policies were not [22]. Message strategies that encouraged high levels of coping selfefficacy, protective habits, beliefs in response efficacy and lower response cost were effective in encouraging employees to following safer behaviors [2].…”
Section: Strength and Weakness Of Individual Sourcesmentioning
confidence: 95%
“…We collectively opted to apply two restrictions with regards to content. First, we excluded papers on IT security (e.g., Puhakainen & Siponen, 2010;Son, 2011), on virtual teams (e.g., Au & Marks, 2012), and on employee monitoring that uses IT to control employees' behavior (e.g., Ariss, 2002;Bock & Swee Ling Ho, 2009;Nord, McCubbins, & Nord, 2006). These excluded topics are more related to an organization's IT capabilities than to its HRM capabilities.…”
Section: Review Scope and Processmentioning
confidence: 99%