A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing …
J D'Arcy, PB Lowry - Information Systems Journal, 2019 - Wiley Online Library
We present a model of employee compliance with information security policy (ISP) that (1) explicates stable, cognitive beliefs regarding the consequences of compliance and …
Previous research has established continuance models that explain and predict an individual's behaviors when engaged with hedonic or functional systems, or with other …
M Karjalainen, S Sarker… - Information Systems …, 2019 - pubsonline.informs.org
The various guidelines, procedures, and policies referred to as information systems security procedures (ISSPs) underlie information systems security behaviors (ISSBs) of many …
Abstract Information systems security behavioral research has primarily focused on individual cognitive processes and their impact on information security policy …
F Xu, XR Luo, C Hsu - Information & Management, 2020 - Elsevier
Security research on the employees' expressive motives in committing computer-related deviant behavior is limited. In this research, drawing on the appraisal tendency framework …
This research-perspective article reviews and contributes to the literature that explains how to deter internal computer abuse (ICA), which is criminal computer behavior committed by …
The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees …
Insider deviant behavior (IDB) in information security (IS) poses significant threats to public and private organizations. To enhance our understanding of IDB, we conducted a systematic …