2023
DOI: 10.1016/j.cose.2023.103386
|View full text |Cite
|
Sign up to set email alerts
|

Understanding extra-role security behaviors: An integration of self-determination theory and construal level theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 75 publications
0
2
0
Order By: Relevance
“…The theoretical foundation of this hypothesis can be traced to the concept of role theory and organisational role expectations, Crosby (1999), Leering et al (2022), Frank and Kohn (2023), Castilla and Ranganathan (2020). Role theory suggests that individuals adhere to behaviours that are congruent with the roles they occupy, driven by the expectations associated with those roles, Bandura (1977), Bandura (1997), Eccles and Wigfield (2020).…”
Section: Hypotheses Discussionmentioning
confidence: 99%
“…The theoretical foundation of this hypothesis can be traced to the concept of role theory and organisational role expectations, Crosby (1999), Leering et al (2022), Frank and Kohn (2023), Castilla and Ranganathan (2020). Role theory suggests that individuals adhere to behaviours that are congruent with the roles they occupy, driven by the expectations associated with those roles, Bandura (1977), Bandura (1997), Eccles and Wigfield (2020).…”
Section: Hypotheses Discussionmentioning
confidence: 99%
“…Empirical studies based on behavioral theories have been carried out to explore the persistent phenomenon of employees disobeying information security regulations (Njenga, 2016). Examples include General Deterrence Theory (GDT) D'Arcy and Herath, (2011), Neutralization Theory Skowronek, (2022), and Self-Determination Theory (SDT) (Frank and Kohn, 2023).…”
Section: Introductionmentioning
confidence: 99%