Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

J D'Arcy, PB Lowry - Information Systems Journal, 2019 - Wiley Online Library
We present a model of employee compliance with information security policy (ISP) that (1)
explicates stable, cognitive beliefs regarding the consequences of compliance and …

Continuance of protective security behavior: A longitudinal study

M Warkentin, AC Johnston, J Shropshire… - Decision Support …, 2016 - Elsevier
Previous research has established continuance models that explain and predict an
individual's behaviors when engaged with hedonic or functional systems, or with other …

Toward a theory of information systems security behaviors of organizational employees: A dialectical process perspective

M Karjalainen, S Sarker… - Information Systems …, 2019 - pubsonline.informs.org
The various guidelines, procedures, and policies referred to as information systems security
procedures (ISSPs) underlie information systems security behaviors (ISSBs) of many …

Integrating cognition with an affective lens to better understand information security policy compliance

D Ormond, M Warkentin, RE Crossler - Journal of the Association …, 2019 - aisel.aisnet.org
Abstract Information systems security behavioral research has primarily focused on
individual cognitive processes and their impact on information security policy …

Anger or fear? Effects of discrete emotions on employee's computer-related deviant behavior

F Xu, XR Luo, C Hsu - Information & Management, 2020 - Elsevier
Security research on the employees' expressive motives in committing computer-related
deviant behavior is limited. In this research, drawing on the appraisal tendency framework …

A tale of two deterrents: Considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research

R Willison, PB Lowry, R Paternoster - Journal of the Association for …, 2018 - aisel.aisnet.org
This research-perspective article reviews and contributes to the literature that explains how
to deter internal computer abuse (ICA), which is criminal computer behavior committed by …

Applications of social network analysis in behavioural information security research: Concepts and empirical analysis

D Dang-Pham, S Pittayachawan, V Bruno - Computers & Security, 2017 - Elsevier
The rapid digital transformation and technological disruption in modern organisations
demand the development of people-centric security workplaces, whereby the employees …

Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review

E Anti, T Vartiainen - 2024 - osuva.uwasa.fi
Insider deviant behavior (IDB) in information security (IS) poses significant threats to public
and private organizations. To enhance our understanding of IDB, we conducted a systematic …