4,418
Views
726
CrossRef citations to date
0
Altmetric
Original Article

Protection motivation and deterrence: a framework for security policy compliance in organisations

&
Pages 106-125 | Received 21 Feb 2008, Accepted 23 Feb 2009, Published online: 19 Dec 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (96)

Fuhua Shi, Yuewen Liu, Xiaobin Ran, Yuquan Xu & Fang Wei. (2024) When and who will take the “escape from haze trip”? An empirical study based on large-scale hotel check-in records. Asia Pacific Journal of Tourism Research 29:3, pages 275-289.
Read now
Yuxiang Hong, Mengyi Xu & Steven Furnell. (2024) Situational support and information security behavioural intention: a comparative study using conservation of resources theory. Behaviour & Information Technology 43:3, pages 523-539.
Read now
Qiuyu Chen & Yuxiang Hong. (2024) Dual Routes of Training on Information Security Policy Compliance. Journal of Computer Information Systems 0:0, pages 1-17.
Read now
Adel Yazdanmehr, Yuan Li & Jingguo Wang. (2023) Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies. European Journal of Information Systems 32:6, pages 1033-1051.
Read now
Xiaofeng Chen & Craig K. Tyran. (2023) A Framework for Analyzing and Improving ISP Compliance. Journal of Computer Information Systems 63:6, pages 1408-1423.
Read now
Soohyun Jeon, Insoo Son & Jinyoung Han. (2023) Understanding employee's emotional reactions to ISSP compliance: focus on frustration from security requirements. Behaviour & Information Technology 42:13, pages 2093-2110.
Read now
Paul Benjamin Lowry, Gregory D. Moody, Srikanth Parameswaran & Nicholas James Brown. (2023) Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis. Journal of Management Information Systems 40:4, pages 1099-1138.
Read now
Nan Liang, David P. Biros & Andy Luse. (2023) An Empirical Comparison of Malicious Insiders and Benign Insiders. Journal of Computer Information Systems 0:0, pages 1-13.
Read now
Anitha Chennamaneni & Babita Gupta. (2023) The privacy protection behaviours of the mobile app users: exploring the role of neuroticism and protection motivation theory. Behaviour & Information Technology 42:12, pages 2011-2029.
Read now
Jamaine Mungo. (2023) Self-paced cybersecurity awareness training educating retail employees to identify phishing attacks. Journal of Cyber Security Technology 0:0, pages 1-49.
Read now
Mohammad I. Merhi & Punit Ahluwalia. (2023) Predicting Compliance of Security Policies: Norms and Sanctions. Journal of Computer Information Systems 0:0, pages 1-15.
Read now
Naomi Woods & Johanna Silvennoinen. (2023) Enhancing the user authentication process with colour memory cues. Behaviour & Information Technology 42:10, pages 1548-1567.
Read now
Lakshmi Goel, Justin Zuopeng Zhang & Steven Williamson. (2023) Work-to-Home Cybersecurity Spillover: Construct Development and Validation. Information Systems Management 40:3, pages 290-300.
Read now
Galit Klein & Moti Zwilling. (2023) The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home. Journal of Computer Information Systems 0:0, pages 1-15.
Read now
Kerry McKellar, Elizabeth Sillence, Nick Neave & Pam Briggs. (2023) Digital accumulation behaviours and information management in the workplace: exploring the tensions between digital data hoarding, organisational culture and policy. Behaviour & Information Technology 0:0, pages 1-13.
Read now
Adel Yazdanmehr & Jingguo Wang. (2023) Can peers help reduce violations of information security policies? The role of peer monitoring. European Journal of Information Systems 32:3, pages 508-528.
Read now
Ignacio Fernandez De Arroyabe & Juan Carlos Fernandez de Arroyabe. (2023) The severity and effects of Cyber-breaches in SMEs: a machine learning approach. Enterprise Information Systems 17:3.
Read now
Joshua Davis, Deepti Agrawal & Xiang Guo. (2023) Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment. European Journal of Information Systems 32:2, pages 195-206.
Read now
Anat Hovav, Itzhak Gnizy & Jinyoung Han. (2023) The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective. European Journal of Information Systems 32:2, pages 154-172.
Read now
Matthew Hull, Leah Zhang-Kennedy, Khadija Baig & Sonia Chiasson. (2022) Understanding individual differences: factors affecting secure computer behaviour. Behaviour & Information Technology 41:15, pages 3237-3263.
Read now
Jensen Deutrom, Vasilis Katos & Raian Ali. (2022) Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19. Behaviour & Information Technology 41:14, pages 3161-3175.
Read now
Tong Xin, Mikko Siponen & Sihua Chen. (2022) Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats. Behaviour & Information Technology 41:13, pages 2835-2859.
Read now
Tianyi Chen, Yiik Diew Wong, Xueqin Wang & Duowei Li. (2022) Investigating consumers’ intention of using contactless logistics technology in COVID-19 pandemic: a Copula-Bayesian Network approach. International Journal of Logistics Research and Applications 0:0, pages 1-21.
Read now
Hwee-Joo Kam, Dan J. Kim & Wu He. (2022) Should we wear a velvet glove to enforce Information security policies in higher education?. Behaviour & Information Technology 41:10, pages 2259-2273.
Read now
Lies De Kimpe, Michel Walrave, Pieter Verdegem & Koen Ponnet. (2022) What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context. Behaviour & Information Technology 41:8, pages 1796-1808.
Read now
Anna Georgiadou, Spiros Mouzakitis, Kanaris Bounas & Dimitrios Askounis. (2022) A Cyber-Security Culture Framework for Assessing Organization Readiness. Journal of Computer Information Systems 62:3, pages 452-462.
Read now
Yanxia Lu, Jiangnan Qiu, Chun Jin, Wenjing Gu & Shangxiao Dou. (2022) The influence of psychological language words contained in microblogs on dissemination behaviour in emergency situations – mediating effects of emotional responses. Behaviour & Information Technology 41:6, pages 1337-1356.
Read now
Queen A. Aigbefo, Yvette Blount & Mauricio Marrone. (2022) The influence of hardiness and habit on security behaviour intention. Behaviour & Information Technology 41:6, pages 1151-1170.
Read now
Ai Na Seow & Yuen Onn Choong. (2022) The effects of implementation intentions on educational tourism: a protection motivation theory approach. Journal of Teaching in Travel & Tourism 22:2, pages 163-178.
Read now
Elinor Tsen, Ryan K L Ko & Sergeja Slapnicar. (2022) An exploratory study of organizational cyber resilience, its precursors and outcomes . Journal of Organizational Computing and Electronic Commerce 32:2, pages 153-174.
Read now
Alex Leering, Lidwien van de Wijngaert & Shahrokh Nikou. (2022) More honour'd in the breach: predicting non-compliant behaviour through individual, situational and habitual factors. Behaviour & Information Technology 41:3, pages 519-534.
Read now
Kalpit Sharma & Arunabha Mukhopadhyay. (2022) Sarima-Based Cyber-Risk Assessment and Mitigation Model for A Smart City’s Traffic Management Systems (Scram). Journal of Organizational Computing and Electronic Commerce 32:1, pages 1-20.
Read now
Charlette Donalds & Corlane Barclay. (2022) Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance. European Journal of Information Systems 31:1, pages 58-73.
Read now
Moti Zwilling, Galit Klien, Dušan Lesjak, Łukasz Wiechetek, Fatih Cetin & Hamdullah Nejat Basim. (2022) Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. Journal of Computer Information Systems 62:1, pages 82-97.
Read now
Yuxiang Hong & Steven Furnell. (2022) Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization. Journal of Computer Information Systems 62:1, pages 19-28.
Read now
Thomas Dearden. (2021) Who Responded to Equifax? Self-Protection Strategies When Guardians Fail. Victims & Offenders 16:8, pages 1149-1160.
Read now
Mark Khai Shean Tan, Sigi Goode & Alex Richardson. (2021) Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security. Behaviour & Information Technology 40:9, pages 903-932.
Read now
Ka Chung Ng, Xiaojun Zhang, James Y. L. Thong & Kar Yan Tam. (2021) Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective. Journal of Management Information Systems 38:3, pages 732-764.
Read now
Carlene Blackwood-Brown, Yair Levy & John D’Arcy. (2021) Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective. Journal of Computer Information Systems 61:3, pages 195-206.
Read now
Paul Loft, Ying He, Helge Janicke & Isabel Wagner. (2021) Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis. Enterprise Information Systems 15:4, pages 448-473.
Read now
Przemysław G. Hensel & Agnieszka Kacprzak. (2021) Curbing cyberloafing: studying general and specific deterrence effects with field evidence. European Journal of Information Systems 30:2, pages 219-235.
Read now
Alex Koohang, Jeretta Horn Nord, Zoroayka V. Sandoval & Joanna Paliszkiewicz. (2021) Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance. Journal of Computer Information Systems 61:2, pages 99-107.
Read now
Nelson K.F. Tsang & Ophelia Wong. (2021) Traveler’s adoption of travel advisory system: a case of Hong Kong’s outbound travel alert system. Journal of Travel & Tourism Marketing 38:2, pages 213-231.
Read now
Matthew L. Jensen, Alexandra Durcikova & Ryan T Wright. (2021) Using susceptibility claims to motivate behaviour change in IT security. European Journal of Information Systems 30:1, pages 27-45.
Read now
Areej Alyami, David Sammon, Karen Neville & Carolanne Mahony. (2020) Exploring IS security themes: a literature analysis. Journal of Decision Systems 29:sup1, pages 425-437.
Read now
Val Hooper & Chris Blunt. (2020) Factors influencing the information security behaviour of IT employees. Behaviour & Information Technology 39:8, pages 862-874.
Read now
Sebastian W. Schuetz, Paul Benjamin Lowry, Daniel A. Pienta & Jason Bennett Thatcher. (2020) The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. Journal of Management Information Systems 37:3, pages 723-757.
Read now
Sadaf Hina & P. Dhanapal Durai Dominic. (2020) Information security policies’ compliance: a perspective for higher education institutions. Journal of Computer Information Systems 60:3, pages 201-211.
Read now
Alex Koohang, Alojzy Nowak, Joanna Paliszkiewicz & Jeretta Horn Nord. (2020) Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness. Journal of Computer Information Systems 60:1, pages 1-8.
Read now
Ofir Turel, Zhengchuan Xu & Ken Guo. (2020) Organizational Citizenship Behavior Regarding Security: Leadership Approach Perspective. Journal of Computer Information Systems 60:1, pages 61-75.
Read now
Marko Niemimaa & Elina Niemimaa. (2019) Abductive innovations in information security policy development: an ethnographic study. European Journal of Information Systems 28:5, pages 566-589.
Read now
Teodor Sommestad, Henrik Karlzén & Jonas Hallberg. (2019) The Theory of Planned Behavior and Information Security Policy Compliance. Journal of Computer Information Systems 59:4, pages 344-353.
Read now
Akhyari Nasir, Ruzaini Abdullah Arshah & Mohd Rashid Ab Hamid. (2019) A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions. Information Security Journal: A Global Perspective 28:3, pages 55-80.
Read now
Hao Chen & Wenli Li. (2019) Understanding commitment and apathy in is security extra-role behavior from a person-organization fit perspective. Behaviour & Information Technology 38:5, pages 454-468.
Read now
Tim Chenoweth, Tom Gattiker & Karen Corral. (2019) Adaptive and Maladaptive Coping with an It Threat. Information Systems Management 36:1, pages 24-39.
Read now
Xiaofeng Chen, Liqiang Chen & Dazhong Wu. (2018) Factors That Influence Employees’ Security Policy Compliance: An Awareness-Motivation-Capability Perspective. Journal of Computer Information Systems 58:4, pages 312-324.
Read now
Obi Ogbanufe & Dan J. Kim. (2018) “Just how risky is it anyway?” The role of risk perception and trust on click-through intention. Information Systems Management 35:3, pages 182-200.
Read now
Suresh Cuganesan, Cara Steele & Alison Hart. (2018) How senior management and workplace norms influence information security attitudes and self-efficacy. Behaviour & Information Technology 37:1, pages 50-65.
Read now
Tanya McGill & Nik Thompson. (2017) Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behaviour & Information Technology 36:11, pages 1111-1124.
Read now
Paul Benjamin Lowry, Tamara Dinev & Robert Willison. (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26:6, pages 546-563.
Read now
W. Alec Cram, Jeffrey G. Proudfoot & John D’Arcy. (2017) Organizational information security policies: a review and research framework. European Journal of Information Systems 26:6, pages 605-641.
Read now
Gregory D. Moody, Dennis F. Galletta & Brian Kimball Dunn. (2017) Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems 26:6, pages 564-584.
Read now
Tatyana Ryutov, Nicole Sintov, Mengtian Zhao & Richard S. John. (2017) Predicting information security policy compliance intentions and behavior for six employee-based risks. Journal of Information Privacy and Security 13:4, pages 260-281.
Read now
Philip Menard, Gregory J. Bott & Robert E. Crossler. (2017) User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory. Journal of Management Information Systems 34:4, pages 1203-1230.
Read now
Chad Anderson, Richard L. Baskerville & Mala Kaul. (2017) Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information. Journal of Management Information Systems 34:4, pages 1082-1112.
Read now
Youseef Alotaibi & Fei Liu. (2017) Survey of business process management: challenges and solutions. Enterprise Information Systems 11:8, pages 1119-1153.
Read now
Jim Q. Chen & Allen Benusa. (2017) HIPAA security compliance challenges: The case for small healthcare providers. International Journal of Healthcare Management 10:2, pages 135-146.
Read now
Wachiraporn Arunothong & Derek L. Nazareth. (2017) The Effect of Procedural and Technological Security Countermeasures on the Propensity to Misuse Medical Data. Journal of Information Privacy and Security 13:2, pages 69-83.
Read now
Elina Niemimaa & Marko Niemimaa. (2017) Information systems security policy implementation in practice: from best practices to situated practices. European Journal of Information Systems 26:1, pages 1-20.
Read now
Lucian L. Visinescu, Olajumoke Azogu, Sherry D. Ryan, Yu “Andy” Wu & Dan J. Kim. (2016) Better Safe than Sorry: A Study of Investigating Individuals’ Protection of Privacy in the Use of Storage as a Cloud Computing Service. International Journal of Human–Computer Interaction 32:11, pages 885-900.
Read now
Allen C Johnston, Merrill Warkentin, Maranda McBride & Lemuria Carter. (2016) Dispositional and situational factors: influences on information security policy violations. European Journal of Information Systems 25:3, pages 231-251.
Read now
Michael A. Erskine, Dawn G. Gregg & Jahangir Karimi. (2016) Perceptions and Attitudes toward Online Mapping Services. Journal of Computer Information Systems 56:2, pages 175-184.
Read now
Bartlomiej Hanus & Yu “Andy” Wu. (2016) Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management 33:1, pages 2-16.
Read now
Clay Posey, Tom L. Roberts & Paul Benjamin Lowry. (2015) The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets. Journal of Management Information Systems 32:4, pages 179-214.
Read now
Yan Chen, K. (Ram) Ramamurthy & Kuang-Wei Wen. (2015) Impacts of Comprehensive Information Security Programs on Information Security Culture. Journal of Computer Information Systems 55:3, pages 11-19.
Read now
Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis & Evangelos Kiountouzis. (2015) Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems 24:1, pages 38-58.
Read now
Philip Menard, Robert Gatlin & Merrill Warkentin. (2014) Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup. Journal of Computer Information Systems 55:1, pages 83-91.
Read now
Mikko Siponen & Anthony Vance. (2014) Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations. European Journal of Information Systems 23:3, pages 289-305.
Read now
Weng Marc Lim. (2014) Sense of virtual community and perceived critical mass in online group buying. Journal of Strategic Marketing 22:3, pages 268-283.
Read now
Jeffrey L. Jenkins, Mark Grimes, Jeffrey Gainer Proudfoot & Paul Benjamin Lowry. (2014) Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Information Technology for Development 20:2, pages 196-213.
Read now
Hwee-Joo Kam & Pairin Katerattanakul. (2014) Information Security in Higher Education: A Neo-Institutional Perspective. Journal of Information Privacy and Security 10:1, pages 28-43.
Read now
Jeffrey D. Wall, Prashant Palvia & Paul Benjamin Lowry. (2013) Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy. Journal of Information Privacy and Security 9:4, pages 52-79.
Read now
Yan Chen, K. Ramamurthy & Kuang-Wei Wen. (2012) Organizations' Information Security Policy Compliance: Stick or Carrot Approach?. Journal of Management Information Systems 29:3, pages 157-188.
Read now
Ramakrishna Ayyagari. (2012) An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights. Journal of Information Privacy and Security 8:2, pages 33-56.
Read now
John D'Arcy & Tejaswini Herath. (2011) A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems 20:6, pages 643-658.
Read now
KenH. Guo, Yufei Yuan, NormanP. Archer & CatherineE. Connelly. (2011) Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model. Journal of Management Information Systems 28:2, pages 203-236.
Read now
Kaushik Ghosh, Parag Dhumal & Sudhir Chawla. (2011) Viability of Fee-Based Email Service for Retail Customers. Journal of Computer Information Systems 52:1, pages 56-65.
Read now
Merrill Warkentin, Allen C Johnston & Jordan Shropshire. (2011) The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems 20:3, pages 267-284.
Read now
Tejaswini Herath, Hemantha Herath & Wayne G. Bremser. (2010) Balanced Scorecard Implementation of Security Strategies: A Framework for IT Security Performance Management. Information Systems Management 27:1, pages 72-81.
Read now
Lixuan Zhang & WilliamC. McDowell. (2009) Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords. Journal of Internet Commerce 8:3-4, pages 180-197.
Read now
Sanjana Sundara Raj Sreenath, Barbara Hewitt & Sahana Sreenath. Understanding security behaviour among healthcare professionals by comparing results from technology threat avoidance theory and protection motivation theory. Behaviour & Information Technology 0:0, pages 1-16.
Read now
Ya Yin, Carol Hsu & Zhongyun Zhou. Understanding employees' responses to information security management practices: a person-environment fit perspective. Behaviour & Information Technology 0:0, pages 1-23.
Read now
XiaoShu Xu, Wilson Cheong Hin Hong, Kimberly Kolletar-Zhu, YunFeng Zhang & ChunYang Chi. Validation and application of the human aspects of information security questionnaire for undergraduates: effects of gender, discipline and grade level. Behaviour & Information Technology 0:0, pages 1-22.
Read now

Articles from other publishers (630)

Byung-Jik Kim & Min-Jik Kim. (2024) The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT. Technology in Society 77, pages 102543.
Crossref
Robin L. Wakefield & Lane T. Wakefield. (2024) How Do Job Seekers Respond to Cybervetting? An Exploration of Threats, Fear, and Access Control. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 55:1, pages 136-155.
Crossref
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty & Steven D'Alessandro. (2024) Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours. Information & Computer Security.
Crossref
Ahmad Mtair Al-Hawamleh. (2024) Investigating the multifaceted dynamics of cybersecurity practices and their impact on the quality of e-government services: evidence from the KSA. Digital Policy, Regulation and Governance 26:3, pages 317-336.
Crossref
Tim Wright, Zainab Ruhwanya & Jacques Ophoff. (2024) Using the theory of interpersonal behaviour to explain employees’ cybercrime preventative behaviour during the pandemic. Information & Computer Security.
Crossref
Siqi Hu, Carol Hsu & Zhongyun Zhou. (2023) Understanding employees' perceptions of SETA events: the role of pedagogical and communication approaches. Internet Research 34:2, pages 294-319.
Crossref
Jef Naidoo, Ron Dulek, Seth Butler & Brooke Baily. (2024) Reporting a Cyber Security Breach: How Organizations Respond. International Journal of Business Communication.
Crossref
Iris van Ooijen, Claire M. Segijn & Suzanna J. Opree. (2022) Privacy Cynicism and its Role in Privacy Decision-Making. Communication Research 51:2, pages 146-177.
Crossref
Abdillah Abdillah, Ida Widianingsih, Rd Ahmad Buchari & Heru Nurasa. (2024) Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia. Array 21, pages 100336.
Crossref
Xusen Cheng, Ying Bao, Triparna de Vreede, Gert-Jan de Vreede & Junhan Gu. (2023) Ride-sharing customers’ self-protection motivation in the post-COVID-19 world. International Journal of Contemporary Hospitality Management 36:4, pages 1114-1142.
Crossref
Kate-Riin Kont. (2024) Management of cyber risks in the library: analysis of information security awareness of Estonian library employees. Library Management 45:1/2, pages 118-140.
Crossref
Crystal T. Lee, Zimo Li & Yung-Cheng Shen. (2024) Building bonds: an examination of relational bonding in continuous content contribution behaviors on metaverse-based non-fungible token platforms. Internet Research.
Crossref
Xiaolong Wang, Changlin Wang, Tianyu Yi & Wenli Li. (2024) Understanding the deterrence effect of punishment for marine information security policies non-compliance. Journal of Ocean Engineering and Science 9:1, pages 9-12.
Crossref
Adel Yazdanmehr, Muhammad Jawad, Raquel Benbunan-Fich & Jingguo Wang. (2024) The role of ethical climates in employee information security policy violations. Decision Support Systems 177, pages 114086.
Crossref
Emmanuel Awuni Kolog, Isaac Mensah & Sulemana Bankuoru Egala. (2024) Cyberloafing deterrence in the public sector of Ghana. THE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES.
Crossref
Maryam Nasser AL-Nuaimi. (2022) Human and contextual factors influencing cyber-security in organizations, and implications for higher education institutions: a systematic review. Global Knowledge, Memory and Communication 73:1/2, pages 1-23.
Crossref
Malte Greulich, Sebastian Lins, Daniel Pienta, Jason Bennett Thatcher & Ali Sunyaev. (2024) Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking. Information Systems Research.
Crossref
Hsiang-Lan Cheng, Chiew Mei Tan, Chao-Min Chiu, Hsin-Yi Huang & Yi-Chien Lee. (2024) Using the ELM to Explore the Impact of Fake News on Panic Vaccination Intention. Journal of Global Information Management 32:1, pages 1-39.
Crossref
Heeyoung Choi, Sangun Park & Juyoung Kang. (2024) Enhancing Participatory Security Culture in Public Institutions: An Analysis of Organizational Employees’ Security Threat Recognition Processes. IEEE Access 12, pages 47543-47558.
Crossref
Karen Renaud, Merrill Warkentin, Ganna Pogrebna & Karl van der Schyff. (2024) VISTA: An inclusive insider threat taxonomy, with mitigation strategies. Information & Management 61:1, pages 103877.
Crossref
Eun Hee Park, Jongwoo Kim, Young Soon Park & Kyung Hee Chun. (2024) Facilitating and impeding factors to insiders’ prosocial rule breaking in South Korea. Computers & Security 136, pages 103572.
Crossref
Samanta Mikuletič, Simon Vrhovec, Brigita Skela-Savič & Boštjan Žvanut. (2024) Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Computers & Security 136, pages 103489.
Crossref
Chloe Sutcliffe, Ian Holman, Daniel Goodwin, Gloria Salmoral, Liwa Pardthaisong, Supattra Visessri, Chaiwat Ekkawatpanit & Dolores Rey. (2024) Which factors determine adaptation to drought amongst farmers in Northern Thailand? Investigating farmers’ appraisals of risk and adaptation and their exposure to drought information communications as determinants of their adaptive responses. Mitigation and Adaptation Strategies for Global Change 29:1.
Crossref
Areej Alyami, David Sammon, Karen Neville & Carolanne Mahony. (2023) The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model. Information Technology & People 36:8, pages 94-125.
Crossref
Nan (Peter) Liang, Rudy Hirschheim, Xin (Robert) Luo & Hayden Hollingsworth. (2023) Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective. Journal of Information Technology 38:4, pages 382-415.
Crossref
Andreas Skalkos, Aggeliki Tsohou, Maria Karyda & Spyros Kokolakis. (2023) Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach. Information & Computer Security.
Crossref
Chul Woo Yoo, Inkyoung Hur & Jahyun Goo. (2023) Workgroup Collective Efficacy to Information Security Management: Manifestation of its Antecedents and Empirical Examination. Information Systems Frontiers 25:6, pages 2475-2491.
Crossref
Yavuz Idug, Suman Niranjan, Ila Manuj, David Gligor & Jeffrey Ogden. (2023) Do ride-hailing drivers' psychological behaviors influence operational performance?. International Journal of Operations & Production Management 43:12, pages 2055-2079.
Crossref
Hao Chen & Yufei Yuan. (2022) The impact of ignorance and bias on information security protection motivation: a case of e-waste handling. Internet Research 33:6, pages 2244-2275.
Crossref
W. Alec Cram & John D'Arcy. (2023) ‘What a waste of time’: An examination of cybersecurity legitimacy. Information Systems Journal 33:6, pages 1396-1422.
Crossref
Xuan Wang, Yaojie Li, Hanieh Javadi Khasraghi & Cherie Trumbach. (2023) The mediating role of security anxiety in internet threat avoidance behavior. Computers & Security 134, pages 103429.
Crossref
Ru Huang & Nan Liang. (2022) The influence of familiarity with Information Technology on the effects of deterrence. Current Psychology 42:33, pages 29712-29725.
Crossref
Kristian Kannelønning & Sokratis K. Katsikas. (2023) A systematic literature review of how cybersecurity-related behavior has been assessed. Information & Computer Security 31:4, pages 463-477.
Crossref
Olufunsho I. Falowo, Kehinde Koshoedo & Murat Ozer. (2023) An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review. An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review.
Ya Yin, Carol Hsu & Zhongyun Zhou. (2023) Employees' in-role and extra-role information security behaviors from the P-E fit perspective. Computers & Security 133, pages 103390.
Crossref
Sebastian Hengstler, Stephan Kuehnel, Kristin Masuch, Ilja Nastjuk & Simon Trang. (2023) Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior. Computers & Security 133, pages 103370.
Crossref
Supunmali Ahangama. (2023) Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis. Information Systems Frontiers 25:5, pages 1695-1711.
Crossref
Jessica Parker. 2023. Applied Research Approaches to Technology, Healthcare, and Business. Applied Research Approaches to Technology, Healthcare, and Business 89 102 .
Trang Nguyen. (2023) Understanding Shadow IT usage intention: a view of the dual-factor model. Online Information Review.
Crossref
Muhammad Iskandar Hamzah. (2023) Fear of COVID-19 disease and QR-based mobile payment adoption: a protection motivation perspective. Journal of Financial Services Marketing.
Crossref
Cornelia Gerdenitsch, Daniela Wurhofer & Manfred Tscheligi. (2023) Working conditions and cybersecurity: Time pressure, autonomy and threat appraisal shaping employees’ security behavior. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 17:4.
Crossref
Shixuan Fu, Xiaojiang Zheng, Hongpeng Wang & Yunzhong Luo. (2023) Fear appeals and coping appeals for health product promotion: Impulsive purchasing or psychological distancing?. Journal of Retailing and Consumer Services 74, pages 103383.
Crossref
Eduardo D. Villacis Calderon, Tabitha L. James & Paul Benjamin Lowry. (2023) How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective. Data and Information Management 7:3, pages 100042.
Crossref
Saleh Yahya Alghamdi, Sumeet Kaur, Karishma M. Qureshi, Ali Saeed Almuflih, Naif Almakayeel, Saleh Alsulamy & Mohamed Rafik N. Qureshi. (2023) Antecedents for online food delivery platform leading to continuance usage intention via e-word-of-mouth review adoption. PLOS ONE 18:8, pages e0290247.
Crossref
Yuanxiang John Li & Elizabeth Hoffman. (2023) Designing an incentive mechanism for information security policy compliance: An experiment. Journal of Economic Behavior & Organization 212, pages 138-159.
Crossref
Sérgio Apolinário, Adilson Carlos Yoshikuni & Cláudio Luís Carvalho Larieira. (2023) Resistance to information security due to users’ information safety behaviors: Empirical research on the emerging markets. Computers in Human Behavior 145, pages 107772.
Crossref
Victoria Kisekka & Sanjay Goel. (2022) An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies. Information Systems Frontiers 25:4, pages 1439-1458.
Crossref
Daeun Lee, Harjinder Singh Lallie & Nadine Michaelides. (2023) The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. Cognition, Technology & Work 25:2-3, pages 273-289.
Crossref
Midori Inaba & Takeaki Terada. (2023) Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study. Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study.
Ahmet Duzenci, Hakan Kitapci & Mehmet Sahin Gok. (2023) The Role of Decision-Making Styles in Shaping Cybersecurity Compliance Behavior. Applied Sciences 13:15, pages 8731.
Crossref
Bidyut Hazarika, Utkarsh Shrivastava, Vivek Kumar Singh & Alan Rea. (2023) Motivating mobile payment adoption during global pandemic: insights from protection motivation and theory of planned behavior. Global Knowledge, Memory and Communication.
Crossref
Ashraf Mady, Saurabh Gupta & Merrill Warkentin. (2023) The effects of knowledge mechanisms on employees' information security threat construal. Information Systems Journal 33:4, pages 790-841.
Crossref
Sultana Lubna Alam & Ruonan Sun. (2022) The role of system‐use practices for sustaining motivation in crowdsourcing: A technology‐in‐practice perspective . Information Systems Journal 33:4, pages 758-789.
Crossref
Ramulu Bhukya & Justin Paul. (2023) Social influence research in consumer behavior: What we learned and what we need to learn? – A hybrid systematic literature review. Journal of Business Research 162, pages 113870.
Crossref
Randi Jiang & Jianru Zhang. (2023) The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. Computers & Security 130, pages 103253.
Crossref
Berhanu Aebissa, Gurpreet Dhillon & Million Meshesha. (2023) The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks. Computers & Security 130, pages 103248.
Crossref
Qinfang Hu, Jing Hu & Zhilin Yang. (2022) Performance implications of peer monitoring among suppliers. Asia Pacific Journal of Marketing and Logistics 35:7, pages 1618-1638.
Crossref
Oluwaseun Enoch Akindele, Saheed Ajayi, Luqman Toriola-Coker, Adekunle Sabitu Oyegoke, Hafiz Alaka & Sambo Lyson Zulu. (2023) Sustainable construction practice in Nigeria: barriers and strategies for improvement. Built Environment Project and Asset Management 13:4, pages 590-609.
Crossref
Hsiu-Hua Cheng. (2023) Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety. Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety.
Claire Seungeun Lee & Yi Ting Chua. (2023) The Role of Cybersecurity Knowledge and Awareness in Cybersecurity Intention and Behavior in the United States. Crime & Delinquency.
Crossref
Mansour Naser Alraja, Usman Javed Butt & Maysam Abbod. (2023) Information security policies compliance in a global setting: An employee's perspective. Computers & Security 129, pages 103208.
Crossref
Mohammed A. Al-Sharafi, Mostafa Al-Emran, Ibrahim Arpaci, Noorminshah A. Iahad, Adi Ahmad AlQudah, Mohammad Iranmanesh & Noor Al-Qaysi. (2023) Generation Z use of artificial intelligence products and its impact on environmental sustainability: A cross-cultural comparison. Computers in Human Behavior 143, pages 107708.
Crossref
Qingyu Zhang, Salman Khan, Safeer Ullah Khan & Ikram Ullah Khan. (2023) Assessing the older population acceptance of healthcare wearable in a developing Country: an extended PMT model. Journal of Data, Information and Management 5:1-2, pages 39-53.
Crossref
Eun Hee Park, Jongwoo Kim & Lynn Wiles. (2022) The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information. Information Technology and Management 24:2, pages 177-193.
Crossref
Frederik Ahlemann, Sven Dittes, Tim Fillbrunn, Kevin Rehring, Stefan Reining & Nils Urbach. (2022) Managing In-Company IT Standardization: A Design Theory. Information Systems Frontiers 25:3, pages 1161-1178.
Crossref
Zoran Mitrovic, Colin Thakur & Sudhika Palhad. (2023) Towards Building Cybersecurity Culture in TVET Colleges in South Africa. Towards Building Cybersecurity Culture in TVET Colleges in South Africa.
Ivan Fedorenko, Pierre Berthon & Linda Edelman. (2023) Top secret: Integrating 20 years of research on secrecy. Technovation 123, pages 102691.
Crossref
Wen-Lung Shiau, Xiaoqun Wang & Fei Zheng. (2023) What are the trend and core knowledge of information security? A citation and co-citation analysis. Information & Management 60:3, pages 103774.
Crossref
Luuk Bekkers, Susanne van 't Hoff-de Goede, Ellen Misana-ter Huurne, Ynze van Houten, Remco Spithoven & Eric Rutger Leukfeldt. (2023) Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model. Computers & Security 127, pages 103099.
Crossref
Qin An, Wilson Cheong Hin Hong, XiaoShu Xu, Yunfeng Zhang & Kimberly Kolletar-Zhu. (2022) How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates. International Journal of Information Security 22:2, pages 305-317.
Crossref
Tlou Maggie Masenya. 2023. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems 33 48 .
Ricardo R. Brooks, Kevin J. Williams & So-Yun Lee. (2023) Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation. Journal of Business and Psychology.
Crossref
A. J. Burns, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry & Bryan Fuller. (2023) Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. Information Systems Research 34:1, pages 342-362.
Crossref
Warut Khern-am-nuai, Matthew J. Hashim, Alain PinsonneaultWeining YangNinghui Li. (2023) Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments. Information Systems Research 34:1, pages 157-177.
Crossref
Yi Yong Lee, Chin Lay Gan & Tze Wei Liew. (2023) Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information. International Journal of Environmental Research and Public Health 20:4, pages 3514.
Crossref
John W. Traphagan & Kenneth W. Wisian. (2023) The W&T Realpolitik Scenario and Contact With Extraterrestrial Intelligence: A Reply to Wright et al.. Space Policy 63, pages 101536.
Crossref
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza & Mehwish Javed. (2023) Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. Computers & Security 125, pages 103049.
Crossref
Simon Vrhovec, Igor Bernik & Blaž Markelj. (2023) Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Computers & Security 125, pages 103038.
Crossref
Sumesh J. Philip, Truong (Jack) Luu & Traci Carte. (2023) There's No place like home: Understanding users' intentions toward securing internet-of-things (IoT) smart home networks. Computers in Human Behavior 139, pages 107551.
Crossref
Trung Nguyen Quoc & Binh Nguyen Huu. 2023. Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022). Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022) 77 92 .
Trung Nguyen Quoc, Quyen Phan Thi Bao, Binh Nguyen Huu & An Nguyen Phuoc Bao. 2023. Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022). Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022) 342 359 .
Maksym Vorokhob, Roman Kyrychok, Vladyslav Yaskevych, Yurii Dobryshyn & Serhii Sydorenko. (2023) MODERN PERSPECTIVES OF APPLYING THE CONCEPT OF ZERO TRUST IN BUILDING A CORPORATE INFORMATION SECURITY POLICY. Cybersecurity: Education, Science, Technique 1:21, pages 223-233.
Crossref
Michael Mncedisi Willie. (2023) The Role of Organizational Culture in Cybersecurity: Building a Security-First Culture. SSRN Electronic Journal.
Crossref
Mohammed Bani Baker, Rami Sihwail & Manar Mizher. Integrating cyber security factors with TAM framework for implementation in the Jordanian banks. Integrating cyber security factors with TAM framework for implementation in the Jordanian banks.
Douglas Bosse, Steven Thompson & Peter Ekman. (2023) In consilium apparatus: Artificial intelligence, stakeholder reciprocity, and firm performance. Journal of Business Research 155, pages 113402.
Crossref
Mohammed Mubarkoot, Jörn Altmann, Morteza Rasti-Barzoki, Bernhard Egger & Hyejin Lee. (2023) Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review. Computers & Security 124, pages 102985.
Crossref
Obi Ogbanufe, Robert E. Crossler & David Biros. (2023) The valued coexistence of protection motivation and stewardship in information security behaviors. Computers & Security 124, pages 102960.
Crossref
Ignacio Fernandez De Arroyabe, Carlos F.A. Arranz, Marta F. Arroyabe & Juan Carlos Fernandez de Arroyabe. (2023) Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers & Security 124, pages 102954.
Crossref
Ahmed AlKalbani, Hamed AlBusaidi & Hepu Deng. 2023. Intelligent Sustainable Systems. Intelligent Sustainable Systems 291 303 .
Morné de Bruyn & Tendani Thabela-Chimboza. 2023. South African Institute of Computer Scientists and Information Technologists. South African Institute of Computer Scientists and Information Technologists 117 135 .
Tim Wright, Zainab Ruhwanya & Jacques Ophoff. 2023. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance 445 458 .
Ken Ditha Tania, Norris Syed Abdullah, Norasnita Ahmad & Samsuryadi Sahmin. 2023. Advances on Intelligent Computing and Data Science. Advances on Intelligent Computing and Data Science 639 648 .
Craig W. Gruber, Benjamin Trachik, Catherine Kirby, Sara Dalpe, Lila Silverstein, Siobhan Frey & Brendon W. Bluestein. 2023. Fostering Innovation in the Intelligence Community. Fostering Innovation in the Intelligence Community 1 17 .
Fredrik Karlsson, Karin Hedström & Ella Kolkowska. 2023. Cybersecurity Teaching in Higher Education. Cybersecurity Teaching in Higher Education 37 57 .
Humayun Zafar. (2022) Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare Setting. International Journal of Systems and Software Security and Protection 13:1, pages 1-20.
Crossref
Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang & Youyou Tao. (2022) Patient Trust in Physicians Matters—Understanding the Role of a Mobile Patient Education System and Patient-Physician Communication in Improving Patient Adherence Behavior: Field Study. Journal of Medical Internet Research 24:12, pages e42941.
Crossref
Thomas F. Stafford. (2022) Platform-Dependent Computer Security Complacency: The Unrecognized Insider Threat. IEEE Transactions on Engineering Management 69:6, pages 3814-3825.
Crossref
John Loonam, Jeremy Zwiegelaar, Vikas Kumar & Charles Booth. (2022) Cyber-Resiliency for Digital Enterprises: A Strategic Leadership Perspective. IEEE Transactions on Engineering Management 69:6, pages 3757-3770.
Crossref
Murilo Catussi Almeida, Adilson Carlos Yoshikuni, Rajeev Dwivedi & Cláudio Luís Carvalho Larieira. (2022) Do Leadership Styles Influence Employee Information Systems Security Intention? A Study of the Banking Industry. Global Journal of Flexible Systems Management 23:4, pages 535-550.
Crossref
Wenqin Li, Rongmin Liu, Linhui Sun, Zigu Guo & Jie Gao. (2022) An Investigation of Employees’ Intention to Comply with Information Security System—A Mixed Approach Based on Regression Analysis and fsQCA. International Journal of Environmental Research and Public Health 19:23, pages 16038.
Crossref
Vikram S. Bhadauria & Anitha Chennamaneni. (2022) Do desire, anxiety and personal innovativeness impact the adoption of IoT devices?. Information & Computer Security 30:5, pages 730-750.
Crossref
Nidhi Singh, Richa Misra, Sonali Singh, Nripendra P. Rana & Sangeeta Khorana. (2022) Assessing the factors that influence the adoption of healthcare wearables by the older population using an extended PMT model. Technology in Society 71, pages 102126.
Crossref
Ranjan Pal, Peihan Liu, Taoan Lu & Ed Hua. (2023) How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs . ACM Transactions on Cyber-Physical Systems 6:4, pages 1-31.
Crossref
Abubakar Bello & Queen Aigbefo. 2022. Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications. Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications 243 265 .

Displaying 200 of 726 citing articles. Use the download link below to view the full list of citing articles.

Download full citations list

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.