1,251
Views
122
CrossRef citations to date
0
Altmetric
Original Article

The influence of the informal social learning environment on information privacy policy compliance efficacy and intention

, &
Pages 267-284 | Received 29 Sep 2009, Accepted 08 Dec 2010, Published online: 19 Dec 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (23)

Yuxiang Hong, Mengyi Xu & Steven Furnell. (2024) Situational support and information security behavioural intention: a comparative study using conservation of resources theory. Behaviour & Information Technology 43:3, pages 523-539.
Read now
Zhen Shao, Jose Benitez, Jing Zhang, Hanqing Zheng & Aseel Ajamieh. (2023) Antecedents and performance outcomes of employees’ data analytics skills: an adaptation structuration theory-based empirical investigation. European Journal of Information Systems 32:6, pages 921-940.
Read now
Princely Ifinedo. (2023) Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations. Information Systems Management 40:4, pages 316-336.
Read now
Jaeung Lee, Chul Woo Yoo, Jingguo Wang & H. R. Rao. (2023) Use of Body Worn Camera (BWC) In Gray Scenarios: A Law Enforcement Officers’ Perspective. European Journal of Information Systems 0:0, pages 1-20.
Read now
Adel Yazdanmehr & Jingguo Wang. (2023) Can peers help reduce violations of information security policies? The role of peer monitoring. European Journal of Information Systems 32:3, pages 508-528.
Read now
Botong Xue, Merrill Warkentin, Leigh A. Mutchler & Puzant Balozian. (2023) Self-efficacy in Information Security: A Replication Study. Journal of Computer Information Systems 63:1, pages 1-10.
Read now
Yuxiang Hong & Steven Furnell. (2022) Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization. Journal of Computer Information Systems 62:1, pages 19-28.
Read now
Mark Khai Shean Tan, Sigi Goode & Alex Richardson. (2021) Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security. Behaviour & Information Technology 40:9, pages 903-932.
Read now
Suresh Cuganesan, Cara Steele & Alison Hart. (2018) How senior management and workplace norms influence information security attitudes and self-efficacy. Behaviour & Information Technology 37:1, pages 50-65.
Read now
W. Alec Cram, Jeffrey G. Proudfoot & John D’Arcy. (2017) Organizational information security policies: a review and research framework. European Journal of Information Systems 26:6, pages 605-641.
Read now
Zafer D. Ozdemir, H. Jeff Smith & John H. Benamati. (2017) Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems 26:6, pages 642-660.
Read now
Tatyana Ryutov, Nicole Sintov, Mengtian Zhao & Richard S. John. (2017) Predicting information security policy compliance intentions and behavior for six employee-based risks. Journal of Information Privacy and Security 13:4, pages 260-281.
Read now
Elina Niemimaa & Marko Niemimaa. (2017) Information systems security policy implementation in practice: from best practices to situated practices. European Journal of Information Systems 26:1, pages 1-20.
Read now
Morgan M. Shepherd & Roberto J. Mejias. (2016) Nontechnical Deterrence Effects of Mild and Severe Internet Use Policy Reminders in Reducing Employee Internet Abuse. International Journal of Human–Computer Interaction 32:7, pages 557-567.
Read now
Allen C Johnston, Merrill Warkentin, Maranda McBride & Lemuria Carter. (2016) Dispositional and situational factors: influences on information security policy violations. European Journal of Information Systems 25:3, pages 231-251.
Read now
Dustin Ormond & Merrill Warkentin. (2015) Is this a Joke? The Impact of Message Manipulations on Risk Perceptions. Journal of Computer Information Systems 55:2, pages 9-19.
Read now
Sabine Matook, Susan A Brown & Johanna Rolf. (2015) Forming an intention to act on recommendations given via online social networks. European Journal of Information Systems 24:1, pages 76-92.
Read now
Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis & Evangelos Kiountouzis. (2015) Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems 24:1, pages 38-58.
Read now
John D'Arcy, Tejaswini Herath & MindyK. Shoss. (2014) Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems 31:2, pages 285-318.
Read now
Jeffrey D. Wall, Prashant Palvia & Paul Benjamin Lowry. (2013) Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy. Journal of Information Privacy and Security 9:4, pages 52-79.
Read now
Koteswara Ivaturi & Lech Janczewski. (2013) Social Engineering Preparedness of Online Banks: An Asia-Pacific Perspective. Journal of Global Information Technology Management 16:4, pages 21-46.
Read now
Hongjoo Woo, Naeun Lauren Kim, Zhenghao Tong & Sumin Lee. What causes consumers to participate in collaborative consumption? A self-efficacy perspective toward Peer-to-Peer (P2P) secondhand platforms. The International Review of Retail, Distribution and Consumer Research 0:0, pages 1-23.
Read now

Articles from other publishers (99)

Canitgia TambarikiPHDPHD, Octavianie Bernadette SondakhPHDPHD, Virgino Agassie DondokambeyPHDPHD & Evelyn HendrianaPHDPHD. (2024) Drivers of Banking Consumers’ Cybersecurity Behavior: Applying the Extended Protection Motivation Theory. GATR Journal of Management and Marketing Review 9:1, pages 01-12.
Crossref
Shekhar Rathor, Weidong Xia & Dinesh Batra. (2023) Achieving software development agility: different roles of team, methodological and process factors. Information Technology & People 37:2, pages 835-873.
Crossref
Javad Pool, Saeed Akhlaghpour, Farhad Fatehi & Andrew Burton-Jones. (2024) A systematic analysis of failures in protecting personal health data: A scoping review. International Journal of Information Management 74, pages 102719.
Crossref
Hao Chen & Yuge Hai. (2024) Exploring the critical success factors of information security management: a mixed-method approach. Information & Computer Security.
Crossref
Dien Van Tran, Phuong Van Nguyen, Anh Thi Chau Nguyen, Demetris Vrontis & Phuong Uyen Dinh. (2023) Exploring the influence of government social media on cybersecurity compliance: employee attitudes, motivation and behaviors. Journal of Asia Business Studies 18:1, pages 204-223.
Crossref
Bridget Barnes & Tugrul Daim. (2024) Information Security Maturity Model for Healthcare Organizations in the United States. IEEE Transactions on Engineering Management 71, pages 928-939.
Crossref
Karen Renaud, Merrill Warkentin, Ganna Pogrebna & Karl van der Schyff. (2024) VISTA: An inclusive insider threat taxonomy, with mitigation strategies. Information & Management 61:1, pages 103877.
Crossref
Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper & Matthieu Brinkhuis. (2023) Uncovering the structures of privacy research using bibliometric network analysis and topic modelling. Organizational Cybersecurity Journal: Practice, Process and People 3:2, pages 81-99.
Crossref
Nan (Peter) Liang, Rudy Hirschheim, Xin (Robert) Luo & Hayden Hollingsworth. (2023) Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective. Journal of Information Technology 38:4, pages 382-415.
Crossref
Chul Woo Yoo, Inkyoung Hur & Jahyun Goo. (2023) Workgroup Collective Efficacy to Information Security Management: Manifestation of its Antecedents and Empirical Examination. Information Systems Frontiers 25:6, pages 2475-2491.
Crossref
Noman H. Chowdhury, Marc T.P. Adam & Timm Teubner. (2023) Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity. Information & Computer Security 31:4, pages 504-526.
Crossref
German Neubaum, Miriam Metzger, Nicole Krämer & Elias Kyewski. (2023) How Subjective Norms Relate to Personal Privacy Regulation in Social Media: A Cross-National Approach. Social Media + Society 9:3.
Crossref
Adel Yazdanmehr, Yuan Li & Jingguo Wang. (2022) Employee responses to information security related stress: Coping and violation intention. Information Systems Journal 33:3, pages 598-639.
Crossref
Andrew Reeves, Dragana Calic & Paul Delfabbro. (2023) “Generic and unusable”1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue. Computers & Security 128, pages 103137.
Crossref
Tobias D. Weickert, Adam Joinson & Barnaby Craggs. (2023) Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice. Computers & Security 128, pages 103130.
Crossref
Akshay Aggarwal & Ram Kumar Dhurkari. (2023) Association between stress and information security policy non-compliance behavior: A meta-analysis. Computers & Security 124, pages 102991.
Crossref
Duy Dang-Pham, Hiep Pham, Ai-Phuong Hoang, Diem-Trang Vo & Long T. V. Nguyen. 2023. Information Systems Research in Vietnam. Information Systems Research in Vietnam 83 96 .
Humayun Zafar. (2022) Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare Setting. International Journal of Systems and Software Security and Protection 13:1, pages 1-20.
Crossref
Sultan AlGhamdi, Khin Than Win & Elena Vlahu-Gjorgievska. (2022) Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations. Government Information Quarterly 39:4, pages 101721.
Crossref
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain & Walton Wider. (2022) Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information 13:9, pages 413.
Crossref
Jyoti Choudrie, Efpraxia Zamani & Chike Obuekwe. (2021) Bridging the Digital Divide in Ethnic Minority Older Adults: an Organisational Qualitative Study. Information Systems Frontiers 24:4, pages 1355-1375.
Crossref
Princely Ifinedo, Nigussie Mengesha & Rahel Bekele. (2022) Effects of Personal Factors and Organizational Reinforcing Tools in Decreasing Employee Engagement in Unhygienic Cyber Practices. Journal of Global Information Management 30:1, pages 1-27.
Crossref
Albesë Demjaha, Simon Parkin & David Pym. (2022) The boundedly rational employee: Security economics for behaviour intervention support in organizations1. Journal of Computer Security 30:3, pages 435-464.
Crossref
Yan Chen, Weidong Xia & Karlene Cousins. (2022) Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Computers & Security 113, pages 102568.
Crossref
Alok Mishra, Yehia Ibrahim Alzoubi, Asif Qumer Gill & Memoona Javeria Anwar. (2022) Cybersecurity Enterprises Policies: A Comparative Study. Sensors 22:2, pages 538.
Crossref
Margit Christa Scholl. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 396 423 .
Duy Dang-Pham, Karlheinz Kautz, Ai-Phuong Hoang & Siddhi Pittayachawan. (2022) Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis. Computers & Security 112, pages 102505.
Crossref
Yudy Setiawan & Anita Maharani. 2022. Proceedings of 2nd International Conference on Smart Computing and Cyber Security. Proceedings of 2nd International Conference on Smart Computing and Cyber Security 182 193 .
Ali Vedadi, Merrill Warkentin & Alan Dennis. (2021) Herd behavior in information security decision-making. Information & Management 58:8, pages 103526.
Crossref
Kent Marett & Misty Nabors. (2021) Local learning from municipal ransomware attacks: A geographically weighted analysis. Information & Management 58:7, pages 103482.
Crossref
Chengzhe Fu, Liao Liao & Weijun Huang. (2021) Behavioral Implementation and Compliance of Anti-Epidemic Policy in the COVID-19 Crisis. International Journal of Environmental Research and Public Health 18:7, pages 3776.
Crossref
Lennart Jaeger, Andreas Eckhardt & Julia Kroenung. (2021) The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis. Information & Management 58:3, pages 103318.
Crossref
Zhenya Tang, Andrew S. Miller, Zhongyun Zhou & Merrill Warkentin. (2021) Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Government Information Quarterly 38:2, pages 101572.
Crossref
Yuxiang Hong & Steven Furnell. (2021) Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications 57, pages 102710.
Crossref
Étienne Thenoz. (2021) Gestion des usages des technologies numériques dans les organisations : une approche qualitative par le contrôle organisationnel et les chartes informatiques. Systèmes d'information & management Volume 25:3, pages 51-86.
Crossref
Christian Fernando Libaque-Sáenz, Siew Fan Wong, Younghoon Chang & Edgardo R. Bravo. (2021) The effect of Fair information practices and data collection methods on privacy-related behaviors: A study of Mobile apps. Information & Management 58:1, pages 103284.
Crossref
Ken Ditha Tania, Norris Syed Abdullah, Norasnita Ahmad & Samsuryadi Sahmin. 2021. Innovative Systems for Intelligent Health Informatics. Innovative Systems for Intelligent Health Informatics 960 974 .
Aimi Shazwani Ghazali, Jaap Ham, Emilia Barakova & Panos Markopoulos. (2020) Persuasive Robots Acceptance Model (PRAM): Roles of Social Responses Within the Acceptance Model of Persuasive Robots. International Journal of Social Robotics 12:5, pages 1075-1092.
Crossref
Ruilin Zhu, Aashish Srivastava & Juliana Sutanto. (2020) Privacy-deprived e-commerce: the efficacy of consumer privacy policies on China's e-commerce websites from a legal perspective. Information Technology & People 33:6, pages 1601-1626.
Crossref
Masuda Begum Sampa, Md. Rakibul Hoque, Rafiqul Islam, Mariko Nishikitani, Naoki Nakashima, Fumihiko Yokota, Kimiyo Kikuchi, Md Moshiur Rahman, Faiz Shah & Ashir Ahmed. (2020) Redesigning Portable Health Clinic Platform as a Remote Healthcare System to Tackle COVID-19 Pandemic Situation in Unreached Communities. International Journal of Environmental Research and Public Health 17:13, pages 4709.
Crossref
Mari Karjalainen, Mikko Siponen & Suprateek Sarker. (2020) Toward a stage theory of the development of employees’ information security behavior. Computers & Security 93, pages 101782.
Crossref
Soohyun Jeon, Insoo Son & Jinyoung Han. (2020) Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case. Information Technology & People 34:2, pages 599-616.
Crossref
Leigh A. Mutchler & Merrill Warkentin. (2020) Experience Matters. Journal of Database Management 31:2, pages 1-20.
Crossref
Kholekile L. Gwebu, Jing Wang & Michael Y. Hu. (2019) Information security policy noncompliance: An integrative social influence model. Information Systems Journal 30:2, pages 220-269.
Crossref
Hyungjin Lukas Kim, HanByeol Stella Choi & Jinyoung Han. (2019) Leader power and employees’ information security policy compliance. Security Journal 32:4, pages 391-409.
Crossref
Leigh A. Mutchler. (2019) Response awareness and instructional self-efficacy: influences on intent. Information & Computer Security 27:4, pages 489-507.
Crossref
Margit Christa Scholl. (2019) Raising Information Security Awareness in the Field of Urban and Regional Planning. International Journal of E-Planning Research 8:3, pages 62-86.
Crossref
Ahmed AlKalbani, Hepu Deng & Booi Kam. (2019) The Influence of Organizational Enforcement on the Attitudes of Employees towards Information Security Compliance. The Influence of Organizational Enforcement on the Attitudes of Employees towards Information Security Compliance.
Yuxiang Hong & Steven Furnell. (2019) Organizational formalization and employee information security behavioral intentions based on an extended TPB model. Organizational formalization and employee information security behavioral intentions based on an extended TPB model.
John Agyekum Addae, Grace Simpson & George Oppong Appiagyei Ampong. (2019) Factors Influencing Information Security Policy Compliance Behavior. Factors Influencing Information Security Policy Compliance Behavior.
Karen Renaud, Robert Otondo & Merrill Warkentin. (2019) “This is the way ‘I’ create my passwords” ... does the endowment effect deter people from changing the way they create their passwords?. Computers & Security 82, pages 241-260.
Crossref
Allen C. Johnston, Merrill Warkentin, Alan R. Dennis & Mikko Siponen. (2018) Speak their Language: Designing Effective Messages to Improve Employees’ Information Security Decision Making. Decision Sciences 50:2, pages 245-284.
Crossref
France Belanger & Robert E. Crossler. (2019) Dealing with digital traces: Understanding protective behaviors on mobile devices. The Journal of Strategic Information Systems 28:1, pages 34-49.
Crossref
Rogier van de Wetering. 2019. Business Information Systems. Business Information Systems 221 232 .
Michael Beier & Sebastian Früh. 2019. Collaborative Innovation Networks. Collaborative Innovation Networks 115 124 .
A. J. Burns, Tom L. Roberts, Clay Posey, Rebecca J. Bennett & James F. Courtney. (2017) Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts. Decision Sciences 49:6, pages 1187-1228.
Crossref
Xiaofeng Chen, Dazhong Wu, Liqiang Chen & Joe K.L. Teng. (2018) Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information & Management 55:8, pages 1049-1060.
Crossref
Hui Na Chua, Siew Fan Wong, Yeh Ching Low & Younghoon Chang. (2018) Impact of employees’ demographic characteristics on the awareness and compliance of information security policy in organizations. Telematics and Informatics 35:6, pages 1770-1780.
Crossref
Ahmed Alzahrani, Chris Johnson & Saad Altamimi. (2018) Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation. Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation.
Alan R. Dennis & Randall K. Minas. (2018) Security on Autopilot. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:SI, pages 15-38.
Crossref
Nainika Patnayakuni, Ravi Patnayakuni & Jatinder N. D. Gupta. 2018. Cyber Security and Threats. Cyber Security and Threats 521 543 .
Ahmed AlKalbani, Hepu Deng, Booi Kam & Xiaojuan Zhang. (2017) Information Security Compliance in Organizations: An Institutional Perspective. Data and Information Management 1:2, pages 104-114.
Crossref
Duy Dang-Pham, Siddhi Pittayachawan & Vince Bruno. (2017) Investigation into the formation of information security influence: Network analysis of an emerging organisation. Computers & Security 70, pages 111-123.
Crossref
Stefan Bauer & Edward W.N. Bernroider. (2017) From Information Security Awareness to Reasoned Compliant Action. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48:3, pages 44-68.
Crossref
Puzant Balozian & Dorothy Leidner. (2017) Review of IS Security Policy Compliance. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48:3, pages 11-43.
Crossref
Duy Dang Pham Thien, Karlheinz Kautz, Siddhi Pittayachawan & Vince Bruno. (2017) A Canonical Action Research Approach to the Effective Diffusion of Information Security with Social Network Analysis. International Journal of Systems and Society 4:2, pages 22-43.
Crossref
Bridget Barnes Page. (2017) Exploring Organizational Culture for Information Security in Healthcare Organizations: A Literature Review. Exploring Organizational Culture for Information Security in Healthcare Organizations: A Literature Review.
Duy Dang-Pham, Siddhi Pittayachawan & Vince Bruno. (2017) Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace. Information & Management 54:5, pages 625-637.
Crossref
Duy Dang-Pham, Siddhi Pittayachawan & Vince Bruno. (2017) Applications of social network analysis in behavioural information security research: Concepts and empirical analysis. Computers & Security 68, pages 1-15.
Crossref
Duy Dang-Pham, Siddhi Pittayachawan & Vince Bruno. (2017) Exploring behavioral information security networks in an organizational context: An empirical case study. Journal of Information Security and Applications 34, pages 46-62.
Crossref
Rajiv Aserkar, A. Seetharaman, Joy Ann Macaso Chu, Veena Jadhav & Shivani Inamdar. (2017) Impact of personal data protection (PDP) regulations on operations workflow. Human Systems Management 36:1, pages 41-56.
Crossref
Ella Kolkowska, Fredrik Karlsson & Karin Hedström. (2017) Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method. The Journal of Strategic Information Systems 26:1, pages 39-57.
Crossref
Thomas Kude, Hartmut Hoehle & Tracy Ann Sykes. (2017) Big data breaches and customer compensation strategies. International Journal of Operations & Production Management 37:1, pages 56-74.
Crossref
Nainika Patnayakuni, Ravi Patnayakuni & Jatinder N. D. Gupta. 2017. Harnessing Social Media as a Knowledge Management Tool. Harnessing Social Media as a Knowledge Management Tool 249 271 .
Matthew M. Piszczek, Shaun Pichler, Ofir Turel & Jeffrey Greenhaus. (2016) The Information and Communication Technology User Role: Implications for the Work Role and Inter-Role Spillover. Frontiers in Psychology 7.
Crossref
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire & William D. Barnett. (2016) Continuance of protective security behavior: A longitudinal study. Decision Support Systems 92, pages 25-35.
Crossref
Tabitha L. James, Quinton Nottingham, Stephane E. Collignon, Merrill Warkentin & Jennifer L. Ziegelmayer. (2015) The interpersonal privacy identity (IPI): development of a privacy as control model. Information Technology and Management 17:4, pages 341-360.
Crossref
Duy Dang-Pham, Siddhi Pittayachawan & Vince Bruno. (2016) Impacts of security climate on employees’ sharing of security advice and troubleshooting: Empirical networks. Business Horizons 59:6, pages 571-584.
Crossref
Waldo Rocha Flores & Mathias Ekstedt. (2016) Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Computers & Security 59, pages 26-44.
Crossref
Jeanette Andrade & Wen-Hao David Huang. 2016. Handbook of Research on Learning Outcomes and Opportunities in the Digital Age. Handbook of Research on Learning Outcomes and Opportunities in the Digital Age 308 328 .
Erik Paolo S. Capistrano & Jengchung Victor Chen. (2015) Information privacy policies: The effects of policy characteristics and online experience. Computer Standards & Interfaces 42, pages 24-31.
Crossref
Zhiling Tu, Ofir Turel, Yufei Yuan & Norm Archer. (2015) Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination. Information & Management 52:4, pages 506-517.
Crossref
Mohamed Alaskar, Shahper Vodanovich & Kathy Ning Shen. (2015) Evolvement of Information Security Research on Employees' Behavior: A Systematic Review and Future Direction. Evolvement of Information Security Research on Employees' Behavior: A Systematic Review and Future Direction.
Waldo Rocha Flores, Hannes Holm, Mathias Ekstedt & Marcus Nohlberg. (2015) Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures. Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures.
Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler & Michael H. Breitner. (2014) Information security awareness and behavior: a theory-based literature review. Management Research Review 37:12, pages 1049-1092.
Crossref
John D'Arcy & Gwen Greene. (2014) Security culture and the employment relationship as drivers of employees’ security compliance. Information Management & Computer Security 22:5, pages 474-489.
Crossref
Waldo Rocha Flores, Egil Antonsen & Mathias Ekstedt. (2014) Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers & Security 43, pages 90-110.
Crossref
Merrill Warkentin & Leigh Mutchler. 2014. Computing Handbook, Third Edition. Computing Handbook, Third Edition 54-1 54-20 .
Tonia San Nicolas-Rocca, Benjamin Schooley & Janine L. Spears. (2014) Exploring the Effect of Knowledge Transfer Practices on User Compliance to IS Security Practices. International Journal of Knowledge Management 10:2, pages 62-78.
Crossref
David Avison & Julien Malaurent. (2014) Qualitative Research in three IS journals: Unequal emphasis but common rigour, depth and richness. Systèmes d'information & management Volume 18:4, pages 75-123.
Crossref
Tonia SanNicolas-Rocca, Benjamin Schooley & Janine L. Spears. (2014) Designing Effective Knowledge Transfer Practices to Improve IS Security Awareness and Compliance. Designing Effective Knowledge Transfer Practices to Improve IS Security Awareness and Compliance.
Devinder Thapa & Dan Harnesk. (2014) Rethinking the Information Security Risk Practices: A Critical Social Theory Perspective. Rethinking the Information Security Risk Practices: A Critical Social Theory Perspective.
Morgan Shepherd, Roberto Mejias & Gary Klein. (2014) A Longitudinal Study to Determine Non-technical Deterrence Effects of Severity and Communication of Internet Use Policy for Reducing Employee Internet Abuse. A Longitudinal Study to Determine Non-technical Deterrence Effects of Severity and Communication of Internet Use Policy for Reducing Employee Internet Abuse.
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond & Alan R. Dennis. (2013) Don't make excuses! Discouraging neutralization to reduce IT policy violation. Computers & Security 39, pages 145-159.
Crossref
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin & Richard Baskerville. (2013) Future directions for behavioral information security research. Computers & Security 32, pages 90-101.
Crossref
Dan Harnesk & John Lindström. 2012. Nordic Contributions in IS Research. Nordic Contributions in IS Research 76 94 .
Allen C. Johnston, Barbara Wech & Eric Jack. (2000) Engaging Remote Employees. Journal of Organizational and End User Computing 25:1, pages 1-23.
Crossref
Javad K. Pool & Saeed Akhlaghpour. (2019) Causes and Impacts of Personal Health Information (PHI) Breaches: A Scoping Review and Thematic Analysis. SSRN Electronic Journal.
Crossref
Mohammad Jalali, Maike Bruckes, Daniel Westmattelmann & Gerhard Schewe. (2019) Why Employees (Still) Click on Phishing Links: An Investigation in Hospitals. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.