2018
DOI: 10.1016/j.im.2018.05.011
|View full text |Cite
|
Sign up to set email alerts
|

Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
38
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 70 publications
(39 citation statements)
references
References 65 publications
1
38
0
Order By: Relevance
“…This study used two steps to detect CMV. First, this study followed Bagozzi, Yi, and Phillips (1991) and Chen et al (2018)'s research to test for potential CMV in our data. Table 4 shows that the correlations among all constructs in the present study are less than the suggested threshold of 0.9.…”
Section: Common Methods Variance and Multicollinearity Checkmentioning
confidence: 99%
“…This study used two steps to detect CMV. First, this study followed Bagozzi, Yi, and Phillips (1991) and Chen et al (2018)'s research to test for potential CMV in our data. Table 4 shows that the correlations among all constructs in the present study are less than the suggested threshold of 0.9.…”
Section: Common Methods Variance and Multicollinearity Checkmentioning
confidence: 99%
“…Previous studies showed that there is a gap in existing literature in terms of the differences between men and women in deterrence (Carmichael, 2004;Chen, Wu, Chen, & Teng, 2018). The need for further research investigating gender differences between employees' information systems security behavioural intention has been identified in previous studies (Chen et al, 2018;Gratian, Bandi, Cukier, Dykstra, & Ginther, 2018;Hadlington, 2018). Previous studies investigated gender differences in employees' cybersecurity behaviour (e.g.…”
Section: Gender and Byod Employee Security Behaviour Researchmentioning
confidence: 99%
“…Previous studies investigated gender differences in employees' cybersecurity behaviour (e.g. Akman & Mishra, 2010;Ifinedo, 2014;Ifinedo, 2016;Foth, 2016;Anwar et al, 2017;McCormac et al, 2017;Mamonov & Benbunan-Fich, 2018;Hadlington, 2018;Gratian et al, 2018;Chen et al, 2018). Nevertheless, despite the literature being rich in studies investigating employees' information security behaviour, there is a gap in the literature in three areas.…”
Section: Gender and Byod Employee Security Behaviour Researchmentioning
confidence: 99%
See 2 more Smart Citations