1,590
Views
23
CrossRef citations to date
0
Altmetric
Original Articles

How senior management and workplace norms influence information security attitudes and self-efficacy

, &
Pages 50-65 | Received 07 Feb 2016, Accepted 20 Oct 2017, Published online: 16 Nov 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (7)

Yuxiang Hong, Mengyi Xu & Steven Furnell. (2024) Situational support and information security behavioural intention: a comparative study using conservation of resources theory. Behaviour & Information Technology 43:3, pages 523-539.
Read now
Rathika Palanisamy, Azah Anir Norman & Miss Laiha Mat Kiah. (2024) Employees’ BYOD Security Policy Compliance in the Public Sector. Journal of Computer Information Systems 64:1, pages 62-77.
Read now
Princely Ifinedo. (2023) Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations. Information Systems Management 40:4, pages 316-336.
Read now
Sridhar Srinivasan, Amit Agrahari & Ashwani Kumar. (2023) Role of Executive Sponsors in business analytics success – Understanding their influence domains using Deductive Thematic Analysis. Journal of Decision Systems 32:2, pages 409-438.
Read now
Botong Xue, Merrill Warkentin, Leigh A. Mutchler & Puzant Balozian. (2023) Self-efficacy in Information Security: A Replication Study. Journal of Computer Information Systems 63:1, pages 1-10.
Read now
Hwee-Joo Kam, Dan J. Kim & Wu He. (2022) Should we wear a velvet glove to enforce Information security policies in higher education?. Behaviour & Information Technology 41:10, pages 2259-2273.
Read now
Dirk Snyman & Hennie Kruger. (2019) Behavioural threshold analysis: methodological and practical considerations for applications in information security. Behaviour & Information Technology 38:11, pages 1088-1106.
Read now

Articles from other publishers (16)

Subramaniam Sri Ramalu, Norhaslinda Binti Zainal Abidin, Gunalan Nadarajah & Amni Binti Anuar. (2023) The Determinants of Risky Cybersecurity Behaviour: A Case Study Among Employees in Water Sector in Malaysia. Journal of Law and Sustainable Development 11:12, pages e2706.
Crossref
Sérgio Apolinário, Adilson Carlos Yoshikuni & Cláudio Luís Carvalho Larieira. (2023) Resistance to information security due to users’ information safety behaviors: Empirical research on the emerging markets. Computers in Human Behavior 145, pages 107772.
Crossref
Ryo-Whoa Lee, Seung-Hyuk Choi & Sung-Ho Hu. (2023) Effect of temporal distance and goal type on predictions of future information security: Focus on moderation of self-efficacy and social responsibility. Acta Psychologica 238, pages 103990.
Crossref
Randi Jiang & Jianru Zhang. (2023) The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. Computers & Security 130, pages 103253.
Crossref
Basim AlGhanboosi, Saqib Ali & Ali Tarhini. (2023) Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach. Computers in Human Behavior 144, pages 107702.
Crossref
Lin Liu, Hsing-Wei Tai, Kuo-Tai Cheng, Chia-Chen Wei, Chang-Yen Lee & Yen-Hung Chen. (2022) The Multi-Dimensional Interaction Effect of Culture, Leadership Style, and Organizational Commitment on Employee Involvement within Engineering Enterprises: Empirical Study in Taiwan. Sustainability 14:16, pages 9963.
Crossref
Songmee Kim, Seyoon Jang, Woojin Choi, Chorong Youn & Yuri Lee. (2021) Contactless service encounters among Millennials and Generation Z: the effects of Millennials and Gen Z characteristics on technology self-efficacy and preference for contactless service. Journal of Research in Interactive Marketing 16:1, pages 82-100.
Crossref
Adlyn Adam Teoh, Norjihan Binti Abdul Ghani, Muneer Ahmad, Nz Jhanjhi, Mohammed A. Alzain & Mehedi Masud. (2022) Organizational Data Breach: Building Conscious Care Behavior in Incident Response. Computer Systems Science and Engineering 40:2, pages 505-515.
Crossref
Alexander McLeod & Diane Dolezel. (2022) Information security policy non-compliance: Can capitulation theory explain user behaviors?. Computers & Security 112, pages 102526.
Crossref
Yu-Tsang Chen, Wen-Ling Shih, Chun-Hsiung Lee, Pai-Lu Wu & Chun-Yen Tsai. (2021) Relationships among undergraduates' problematic information security behavior, compulsive internet use, and mindful awareness in Taiwan. Computers & Education 164, pages 104131.
Crossref
Kuang-Ming Kuo, Paul C. Talley & Dyi-Yih Michael Lin. (2021) Hospital Staff’s Adherence to Information Security Policy: A Quest for the Antecedents of Deterrence Variables. INQUIRY: The Journal of Health Care Organization, Provision, and Financing 58, pages 004695802110295.
Crossref
Mada Alassaf & Ali Alkhalifah. (2021) Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review. IEEE Access 9, pages 162687-162705.
Crossref
Isaac Wiafe, Felix Nti Koranteng, Abigail Wiafe, Emmanuel Nyarko Obeng & Winfred Yaokumah. (2020) The role of norms in information security policy compliance. Information & Computer Security 28:5, pages 743-761.
Crossref
S. Raschid Muller & Mary L. Lind. (2020) Factors in Information Assurance Professionals' Intentions to Adhere to Information Security Policies. International Journal of Systems and Software Security and Protection 11:1, pages 17-32.
Crossref
Simon Trang & Benedikt Brendel. (2019) A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research. Information Systems Frontiers 21:6, pages 1265-1284.
Crossref
Frederick Pobee & Daniel Opoku. (2018) Factors Influencing the Development of Information Systems Disaster Recovery Plan in the Ghanaian Banking Industry. International Journal of Strategic Decision Sciences 9:3, pages 127-144.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.