Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
… Thus, we believe that TTAT is an appropriate theoretical … the protection motivation when the
level of organizational commitment … This study explores the impact of SSG and organizational

Preserving organizational trust during disruption

S Gustafsson, N Gillespie, R Searle… - Organization …, 2021 - journals.sagepub.com
… added a contrasting case where organizational trust declined. … the crisis, senior EnCorp
leaders adopted a protective role, ‘We’re … and inclusively exploring future career plans and paths. …

A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
… Following threat appraisal, we explore different ways to respond to that … We believe that it
may be possible to reconcile such … In contrast, in Model 3, which excluded fear, the effects of …

The roles of IT strategies and security investments in reducing organizational security breaches

H Li, S Yoo, WJ Kettinger - Journal of Management Information …, 2021 - Taylor & Francis
… In contrast, although the increase of IT security protection … We believe that this research
offers a starting point and … investments, we responded to calls for research to explore other …

The effectiveness of abstract versus concrete fear appeals in information security

SW Schuetz, P Benjamin Lowry, DA Pienta… - Journal of …, 2020 - Taylor & Francis
… In contrast, we expect that concrete fear appeals will be less … exploring their implications for
research, theory, and practice. … confirmed these effects on threat severity (H1a) and protection

The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention

B Guan, C Hsu - Internet research, 2020 - emerald.com
… To further explore the relationship between the two, we … a new IS security communication
process; in contrast, a CEO's … threats and, thus, were less likely to engage in protective actions …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021 - pubsonline.informs.org
… coping response in which people explore whether they can deal … Thus, in our context, the
equivalent of protection motivation is … In contrast, security threats do not have a physical-harm …

What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime …

L De Kimpe, M Walrave, P Verdegem… - Behaviour & …, 2022 - Taylor & Francis
… Therefore, we will explore the link between perceived knowledge, internet trust and intention
without making predictions about their exact relationship. This results in two exploratory …

Enhancing feelings of security: How institutional trust promotes interpersonal trust

G Spadaro, K Gangl, JW Van Prooijen… - PloS one, 2020 - journals.plos.org
… support the protective function of trust toward governmental … , in contrast with these, we did
not observe a main effect of … research could explore the role of institutional trust in repeated …

When enough is enough: Investigating the antecedents and consequences of information security fatigue

WA Cram, JG Proudfoot, J D'Arcy - Information Systems Journal, 2021 - Wiley Online Library
Exploring security fatigue is particularly salient in light of … By contrast, and based on our
qualitative approach, which … ) and lower self-efficacy (ie, confidence in their ability to perform in a …