3,779
Views
168
CrossRef citations to date
0
Altmetric
Original Articles

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (29)

Princely Ifinedo. (2023) Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations. Information Systems Management 40:4, pages 316-336.
Read now
Juan Carlos Fernandez de Arroyabe, Marta F. Arroyabe, Ignacio Fernandez & Carlos F. A. Arranz. (2023) Cybersecurity Resilience in SMEs. A Machine Learning Approach. Journal of Computer Information Systems 0:0, pages 1-17.
Read now
Hemin Jiang, Jun Zhang & Xiabing Zheng. (2023) How external monitoring can mitigate cyberloafing: understanding the mediating and moderating roles of employees’ self-control. Behaviour & Information Technology 0:0, pages 1-15.
Read now
Hakseung Shin, Juhyun Kang, Abhinav Sharma & Juan Luis Nicolau. (2023) Travel fear and immunity certificates: a two-stakeholder perspective. Journal of Sustainable Tourism 31:8, pages 1902-1920.
Read now
C. Matt Graham & Yonggang Lu. (2023) Skills Expectations in Cybersecurity: Semantic Network Analysis of Job Advertisements. Journal of Computer Information Systems 63:4, pages 937-949.
Read now
Lakshmi Goel, Justin Zuopeng Zhang & Steven Williamson. (2023) Work-to-Home Cybersecurity Spillover: Construct Development and Validation. Information Systems Management 40:3, pages 290-300.
Read now
Rahul Dwivedi, Sridhar Nerur & George Mangalaraj. (2023) Predicting Insider Breaches Using Employee Reviews. Journal of Computer Information Systems 0:0, pages 1-15.
Read now
Adel Yazdanmehr & Jingguo Wang. (2023) Can peers help reduce violations of information security policies? The role of peer monitoring. European Journal of Information Systems 32:3, pages 508-528.
Read now
Ignacio Fernandez De Arroyabe & Juan Carlos Fernandez de Arroyabe. (2023) The severity and effects of Cyber-breaches in SMEs: a machine learning approach. Enterprise Information Systems 17:3.
Read now
Zahed Ghaderi, C. Michael Hall & Luc Beal. (2023) Quarantine hotel employees’ protection motivation, pandemic fear, resilience and behavioural intention. Current Issues in Tourism 26:5, pages 681-691.
Read now
Joshua Davis, Deepti Agrawal & Xiang Guo. (2023) Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment. European Journal of Information Systems 32:2, pages 195-206.
Read now
Alaa Nehme & Joey F. George. (2022) Approaching IT Security & Avoiding Threats in the Smart Home Context. Journal of Management Information Systems 39:4, pages 1184-1214.
Read now
Hwee-Joo Kam, Dan J. Kim & Wu He. (2022) Should we wear a velvet glove to enforce Information security policies in higher education?. Behaviour & Information Technology 41:10, pages 2259-2273.
Read now
Siqi Hu, Carol Hsu & Zhongyun Zhou. (2022) Security Education, Training, and Awareness Programs: Literature Review. Journal of Computer Information Systems 62:4, pages 752-764.
Read now
Queen A. Aigbefo, Yvette Blount & Mauricio Marrone. (2022) The influence of hardiness and habit on security behaviour intention. Behaviour & Information Technology 41:6, pages 1151-1170.
Read now
Inho Hwang, Robin Wakefield, Sanghyun Kim & Taeha Kim. (2021) Security Awareness: The First Step in Information Security Compliance Behavior. Journal of Computer Information Systems 61:4, pages 345-356.
Read now
Mark Khai Shean Tan, Sigi Goode & Alex Richardson. (2021) Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security. Behaviour & Information Technology 40:9, pages 903-932.
Read now
Matthew L. Jensen, Alexandra Durcikova & Ryan T Wright. (2021) Using susceptibility claims to motivate behaviour change in IT security. European Journal of Information Systems 30:1, pages 27-45.
Read now
Areej Alyami, David Sammon, Karen Neville & Carolanne Mahony. (2020) Exploring IS security themes: a literature analysis. Journal of Decision Systems 29:sup1, pages 425-437.
Read now
Sebastian W. Schuetz, Paul Benjamin Lowry, Daniel A. Pienta & Jason Bennett Thatcher. (2020) The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. Journal of Management Information Systems 37:3, pages 723-757.
Read now
Mario Silic & Paul Benjamin Lowry. (2020) Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. Journal of Management Information Systems 37:1, pages 129-161.
Read now
Hao Chen & Wenli Li. (2019) Understanding commitment and apathy in is security extra-role behavior from a person-organization fit perspective. Behaviour & Information Technology 38:5, pages 454-468.
Read now
A. J. Burns, M. Eric Johnson & Deanna D. Caputo. (2019) Spear phishing in a barrel: Insights from a targeted phishing campaign. Journal of Organizational Computing and Electronic Commerce 29:1, pages 24-39.
Read now
Tanya McGill & Nik Thompson. (2017) Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behaviour & Information Technology 36:11, pages 1111-1124.
Read now
Paul Benjamin Lowry, Tamara Dinev & Robert Willison. (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26:6, pages 546-563.
Read now
W. Alec Cram, Jeffrey G. Proudfoot & John D’Arcy. (2017) Organizational information security policies: a review and research framework. European Journal of Information Systems 26:6, pages 605-641.
Read now
Gregory D. Moody, Dennis F. Galletta & Brian Kimball Dunn. (2017) Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems 26:6, pages 564-584.
Read now
Philip Menard, Gregory J. Bott & Robert E. Crossler. (2017) User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory. Journal of Management Information Systems 34:4, pages 1203-1230.
Read now
Brent Furneaux & Michael Wade. (2017) Impediments to Information Systems Replacement: A Calculus of Discontinuance. Journal of Management Information Systems 34:3, pages 902-932.
Read now

Articles from other publishers (139)

Areej Alyami, David Sammon, Karen Neville & Carolanne Mahony. (2023) The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model. Information Technology & People 36:8, pages 94-125.
Crossref
Hao Chen & Yufei Yuan. (2022) The impact of ignorance and bias on information security protection motivation: a case of e-waste handling. Internet Research 33:6, pages 2244-2275.
Crossref
Feng Xu, Carol Hsu, Tawei (David) Wang & Paul Benjamin Lowry. (2023) The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation. Information Systems Journal.
Crossref
Dien Van Tran, Phuong Van Nguyen, Anh Thi Chau Nguyen, Demetris Vrontis & Phuong Uyen Dinh. (2023) Exploring the influence of government social media on cybersecurity compliance: employee attitudes, motivation and behaviors. Journal of Asia Business Studies.
Crossref
Xuan Wang, Yaojie Li, Hanieh Javadi Khasraghi & Cherie Trumbach. (2023) The mediating role of security anxiety in internet threat avoidance behavior. Computers & Security 134, pages 103429.
Crossref
Lin Chen, Jie Zhen, Kunxiang Dong & Zongxiao Xie. (2023) Organisational culture and information security awareness of Chinese grassroots civil servants: A mediated moderation model. Australian Journal of Public Administration.
Crossref
Shuhao Li, Mimi Chen, Xiao Ma & Zhongfeng Sun. (2023) Applying an Extended Protection Motivation Theory Model to Predict Resident Hospitality During the COVID-19 Crisis. Journal of Travel Research.
Crossref
Ashraf Mady, Saurabh Gupta & Merrill Warkentin. (2023) The effects of knowledge mechanisms on employees' information security threat construal. Information Systems Journal 33:4, pages 790-841.
Crossref
Hsiu-Hua Cheng. (2023) Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety. Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety.
Eduardo D. Villacis Calderon, Tabitha L. James & Paul Benjamin Lowry. (2023) How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective. Data and Information Management, pages 100042.
Crossref
David Michael Hull, Sebastian Walter Schuetz & Paul Benjamin Lowry. (2023) Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training. Computers & Security 129, pages 103252.
Crossref
Siqi Hu, Carol Hsu & Zhongyun Zhou. (2023) Understanding employees' perceptions of SETA events: the role of pedagogical and communication approaches. Internet Research.
Crossref
Huimin Hu, Xiaopeng Deng & Amin Mahmoudi. (2021) A cognitive model for understanding fraudulent behavior in construction industry. Engineering, Construction and Architectural Management 30:4, pages 1423-1443.
Crossref
Netty Merdiaty, Athala Insyrania Putri & Wustari L. Mangundjaya. (2023) The effect of organisational commitment to organisational citizenship behaviour through meaningful work as a mediator. International Journal of Research in Business and Social Science (2147- 4478) 12:3, pages 196-206.
Crossref
Sk. Md. Mashrur, Kaili Wang, Brenden Lavoie & Khandker Nurul Habib. (2023) What can bring transit ridership back: An econometric study on the potential of usage incentives and operational policies in the Greater Toronto Area. Transportation Research Part F: Traffic Psychology and Behaviour 95, pages 18-35.
Crossref
Andrew Reeves, Dragana Calic & Paul Delfabbro. (2023) “Generic and unusable”1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue. Computers & Security 128, pages 103137.
Crossref
Chenglong Li, Hongxiu Li & Shaoxiong Fu. (2023) Coping with COVID-19 using contact tracing mobile apps. Industrial Management & Data Systems 123:5, pages 1440-1464.
Crossref
Supunmali Ahangama. (2023) Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis. Information Systems Frontiers.
Crossref
Sk. Md. Mashrur, Kaili Wang, Patrick Loa, Sanjana Hossain & Khandker Nurul Habib. (2022) Application of Protection Motivation Theory to Quantify the Impact of Pandemic Fear on Anticipated Postpandemic Transit Usage. Transportation Research Record: Journal of the Transportation Research Board 2677:4, pages 267-286.
Crossref
Wen-Lung Shiau, Xiaoqun Wang & Fei Zheng. (2023) What are the trend and core knowledge of information security? A citation and co-citation analysis. Information & Management 60:3, pages 103774.
Crossref
A. J. Burns, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry & Bryan Fuller. (2023) Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. Information Systems Research 34:1, pages 342-362.
Crossref
Chenglong Li & Hongxiu Li. (2023) Disentangling facial recognition payment service usage behavior: A trust perspective. Telematics and Informatics 77, pages 101939.
Crossref
Obi Ogbanufe. (2023) Securing online accounts and assets: An examination of personal investments and protection motivation. International Journal of Information Management 68, pages 102590.
Crossref
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza & Mehwish Javed. (2023) Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. Computers & Security 125, pages 103049.
Crossref
David Hull, Sebastian Schuetz & Paul Benjamin Lowry. (2023) Tell Me A Story: The Effects That Narratives Exert on Meaningful-Engagement Outcomes in Antiphishing Training. SSRN Electronic Journal.
Crossref
Obi Ogbanufe, Robert E. Crossler & David Biros. (2023) The valued coexistence of protection motivation and stewardship in information security behaviors. Computers & Security 124, pages 102960.
Crossref
Ignacio Fernandez De Arroyabe, Carlos F.A. Arranz, Marta F. Arroyabe & Juan Carlos Fernandez de Arroyabe. (2023) Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers & Security 124, pages 102954.
Crossref
Marcus Gerdin, Åke Grönlund & Ella Kolkowska. 2023. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance 470 481 .
Špela Grilc, Kaja Prislan & Anže Mihelič. (2022) Teorije in modeli v vedenjskih informacijskovarnostnih raziskavah. Psihološka obzorja / Horizons of Psychology 31, pages 602-622.
Crossref
Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa & Sarah Bankins. (2022) The influence of ethical principles and policy awareness priming on university students’ judgements about ICT code of conduct compliance. Organizational Cybersecurity Journal: Practice, Process and People 2:2, pages 134-161.
Crossref
Wenqin Li, Rongmin Liu, Linhui Sun, Zigu Guo & Jie Gao. (2022) An Investigation of Employees’ Intention to Comply with Information Security System—A Mixed Approach Based on Regression Analysis and fsQCA. International Journal of Environmental Research and Public Health 19:23, pages 16038.
Crossref
Özgür TÜRK & Öznur TULUNAY ATEŞ. (2022) Öğretmenlerin Örgütsel Bağlılıkları Ve Motivasyonları Arasındaki İlişkiler: Meta Analiz ÇalışmasıThe Relationships Between Teachers' Organizational Commitment and Motivation: A Meta-Analysis Study. Pamukkale University Journal of Education.
Crossref
Wei Zhu. (2022) Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis. Journal of Environmental and Public Health 2022, pages 1-12.
Crossref
Sultan AlGhamdi, Khin Than Win & Elena Vlahu-Gjorgievska. (2022) Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations. Government Information Quarterly 39:4, pages 101721.
Crossref
Puzant Balozian, Dorothy Leidner & Botong Xue. (2021) Toward an intellectual capital cyber security theory: insights from Lebanon. Journal of Intellectual Capital 23:6, pages 1328-1347.
Crossref
Canchu Lin, Jenell L.S. Wittmer & Xin (Robert) Luo. (2022) Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance. Information & Management 59:6, pages 103650.
Crossref
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain & Walton Wider. (2022) Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information 13:9, pages 413.
Crossref
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, Jegatheesan Rajadurai, Suhaidah Hussain & Siti Aminah Harun. (2022) Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review. Social Sciences 11:9, pages 386.
Crossref
Princely Ifinedo, Nigussie Mengesha & Rahel Bekele. (2022) Effects of Personal Factors and Organizational Reinforcing Tools in Decreasing Employee Engagement in Unhygienic Cyber Practices. Journal of Global Information Management 30:1, pages 1-27.
Crossref
Prosper Kandabongee Yeng, Muhammad Ali Fauzi & Bian Yang. (2022) A Comprehensive Assessment of Human Factors in Cyber Security Compliance toward Enhancing the Security Practice of Healthcare Staff in Paperless Hospitals. Information 13:7, pages 335.
Crossref
Hsin Hsin Chang, Kit Hong Wong & Ho Chin Lee. (2022) Peer privacy protection motivation and action on social networking sites: Privacy self-efficacy and information security as moderators. Electronic Commerce Research and Applications 54, pages 101176.
Crossref
Hung-Pin Shih, Kee-hung Lai, Xitong Guo, Xitong Guo & T. C. E. Cheng. (2022) Believe It or Not. Journal of Global Information Management 29:6, pages 1-20.
Crossref
France Bélanger, Jürgen Maier & Michaela Maier. (2022) A longitudinal study on improving employee information protective knowledge and behaviors. Computers & Security 116, pages 102641.
Crossref
Obi M. Ogbanufe & Corey Baham. (2022) Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret. Information Systems Frontiers.
Crossref
Abdallah Alsaad & Manaf Al-Okaily. (2021) Acceptance of protection technology in a time of fear: the case of Covid-19 exposure detection apps. Information Technology & People 35:3, pages 1116-1135.
Crossref
Diana Fischer-Preßler, Dario Bonaretti & Kai Fischbach. (2021) A Protection-Motivation Perspective to Explain Intention to Use and Continue to Use Mobile Warning Systems. Business & Information Systems Engineering 64:2, pages 167-182.
Crossref
Chenhui Liu, Huigang Liang, Nengmin Wang & Yajiong Xue. (2021) Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender. Information Technology & People 35:2, pages 802-834.
Crossref
Sixuan Zhang, Dorothy Leidner, Xin Cao & Ning Liu. (2021) Workplace cyberbullying: A criminological and routine activity perspective. Journal of Information Technology 37:1, pages 51-79.
Crossref
Fredrik Karlsson, Ella Kolkowska & Johan Petersson. (2022) Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis. Computers & Security 114, pages 102578.
Crossref
Ling Li, Li Xu & Wu He. (2022) The effects of antecedents and mediating factors on cybersecurity protection behavior. Computers in Human Behavior Reports 5, pages 100165.
Crossref
Obi Ogbanufe & Robert Pavur. (2022) Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection. International Journal of Information Management 62, pages 102432.
Crossref
Shunying Zhao, Baojuan Ye, Weisha Wang & Yadi Zeng. (2022) The Intolerance of Uncertainty and “Untact” Buying Behavior: The Mediating Role of the Perceived Risk of COVID-19 Variants and Protection Motivation. Frontiers in Psychology 13.
Crossref
Peace Kumah. 2022. Research Anthology on Human Resource Practices for the Modern Workforce. Research Anthology on Human Resource Practices for the Modern Workforce 1251 1277 .
Peace Kumah, Winfred Yaokumah & Charles Buabeng-Andoh. 2022. Research Anthology on Human Resource Practices for the Modern Workforce. Research Anthology on Human Resource Practices for the Modern Workforce 448 470 .
Peace Kumah, Winfred Yaokumah & Charles Buabeng-Andoh. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 326 348 .
Peace Kumah. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 300 325 .
Yesi Mutia Basri. (2022) Determinants of Fraud in the Public Sector: A Study on Village Government in Indonesia. MUDRA: Journal of Finance and Accounting 9:1, pages 93-113.
Crossref
Xiaofen Ma. (2022) IS professionals’ information security behaviors in Chinese IT organizations for information security protection. Information Processing & Management 59:1, pages 102744.
Crossref
Aihui Chen & Yaobin Lu. (2021) Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory. International Journal of Information Management 61, pages 102402.
Crossref
Rabab Ali Abumalloh, Shahla Asadi, Mehrbakhsh Nilashi, Behrouz Minaei-Bidgoli, Fatima Khan Nayer, Sarminah Samad, Saidatulakmal Mohd & Othman Ibrahim. (2021) The impact of coronavirus pandemic (COVID-19) on education: The role of virtual and remote laboratories in education. Technology in Society 67, pages 101728.
Crossref
Nico Foecking, Mei Wang & Toan Luu Duc Huynh. (2021) How do investors react to the data breaches news? Empirical evidence from Facebook Inc. during the years 2016–2019. Technology in Society 67, pages 101717.
Crossref
Botong Xue, Feng Xu, Xin Luo & Merrill Warkentin. (2021) Ethical leadership and employee information security policy (ISP) violation: exploring dual-mediation paths. Organizational Cybersecurity Journal: Practice, Process and People 1:1, pages 5-23.
Crossref
Siqi Hu, Carol Hsu & Zhongyun Zhou. (2021) The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective. Computers & Security 109, pages 102404.
Crossref
Obi Ogbanufe, Robert E. Crossler & David Biros. (2021) Exploring stewardship: A precursor to voluntary security behaviors. Computers & Security 109, pages 102397.
Crossref
Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, Xin (Robert) Luo, Gregory D. MoodyRobert Willison. (2021) Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. Information Systems Research 32:3, pages 1043-1065.
Crossref
Marc Dupuis & Karen Renaud. (2020) Scoping the ethical principles of cybersecurity fear appeals. Ethics and Information Technology 23:3, pages 265-284.
Crossref
Hwee-Joo Kam, Thomas Mattson & Dan J. Kim. (2020) The “Right” recipes for security culture: a competing values model perspective. Information Technology & People 34:5, pages 1490-1512.
Crossref
Jean-François Berthevas. (2021) How protection motivation and social bond factors influence information security behavior. Systèmes d'information & management Volume 26:2, pages 77-115.
Crossref
Faramarz Soheili, Reza Rostaei, Ali Akbar Khasseh & Mehri Shahbazi. (2021) Evaluating the Behavior of Users of Mobile Electronic Devices with the Emphasis on Protection Motivation Theory of Data Breach: a Case Study of Graduate Students. Iranian Journal of Information Processing and Management 36:4, pages 1137-1157.
Crossref
Sang Cheol Park, Munkh-Erdene Tserendulam & Sung Yul Ryoo. (2021) The Two Minds of Non-Work-Related Computing in the Workplace. SAGE Open 11:3, pages 215824402110439.
Crossref
Samantha Bax, Tanya McGill & Val Hobbs. (2021) Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs. Computers & Security 106, pages 102278.
Crossref
Semih Çayak. (2021) The Effect of Sustainable Leadership Behaviors of School Principals on Teachers’ Organizational Commitment and Job Satisfaction. Discourse and Communication for Sustainable Education 12:1, pages 102-120.
Crossref
Inho Hwang. (2021) The Effects of Information Security Organizational Injustice on Information Security Anxiety and Avoidance Behavior: Focusing on Moderation Effects of Victim Justice Sensitivity. Journal of Digital Contents Society 22:5, pages 855-866.
Crossref
Woo Jin Lee & Inho Hwang. (2021) Sustainable Information Security Behavior Management: An Empirical Approach for the Causes of Employees’ Voice Behavior. Sustainability 13:11, pages 6077.
Crossref
Steffi Haag, Mikko Siponen & Fufan Liu. (2021) Protection Motivation Theory in Information Systems Security Research. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52:2, pages 25-67.
Crossref
Danni Zheng, Qiuju Luo & Brent W. Ritchie. (2021) Afraid to travel after COVID-19? Self-protection, coping and resilience against pandemic ‘travel fear’. Tourism Management 83, pages 104261.
Crossref
A. J. Burns, Clay Posey & Tom L. Roberts. (2019) Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity. Information Systems Frontiers 23:2, pages 343-360.
Crossref
Canchu Lin & Xin (Robert) Luo. (2021) Toward a Unified View of Dynamic Information Security Behaviors. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52:1, pages 65-90.
Crossref
Matthew Canham, Clay Posey, Delainey Strickland & Michael Constantino. (2021) Phishing for Long Tails: Examining Organizational Repeat Clickers and Protective Stewards. SAGE Open 11:1, pages 215824402199065.
Crossref
Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang & Rachida F. Parks. (2021) Patients’ compliance behavior in a personalized mobile patient education system (PMPES) setting: Rational, social, or personal choices?. International Journal of Medical Informatics 145, pages 104295.
Crossref
George Raywood-Burke, Laura M. Bishop, Phoebe M. Asquith & Phillip L. Morgan. 2021. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust 226 240 .
Clay Posey & Robert Folger. (2020) An exploratory examination of organizational insiders’ descriptive and normative perceptions of cyber-relevant rights and responsibilities. Computers & Security 99, pages 102038.
Crossref
Wei Wu & Xiang Gong. (2020) Motivation and sustained participation in the online crowdsourcing community: the moderating role of community commitment. Internet Research 31:1, pages 287-314.
Crossref
Rao Faizan Ali, P.D.D. Dominic & Kashif Ali. (2020) Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees. Sustainability 12:20, pages 8576.
Crossref
Tsholofelo Rantao & Kennedy Njenga. (2020) Predicting communication constructs towards determining information security policies compliance. SA Journal of Information Management 22:1.
Crossref
Chenhui Liu, Nengmin Wang & Huigang Liang. (2020) Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment. International Journal of Information Management 54, pages 102152.
Crossref
Hwee-Joo Kam, Thomas Mattson & Sanjay Goel. (2019) A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness. Information Systems Frontiers 22:5, pages 1241-1264.
Crossref
Inho Hwang. (2020) The Effect of Information Security Delivery Activities and Feedback on Work Impediment and Compliance Intention. Journal of Digital Contents Society 21:9, pages 1653-1663.
Crossref
Jie Zhen, Zongxiao Xie & Kunxiang Dong. (2020) POSITIVE EMOTIONS AND EMPLOYEES’ PROTECTION-MOTIVATED BEHAVIOURS: A MODERATED MEDIATION MODEL. Journal of Business Economics and Management 21:5, pages 1466-1485.
Crossref
Daniel Pienta, Jason Bennett Thatcher & Allen Johnston. (2020) Protecting a whale in a sea of phish. Journal of Information Technology 35:3, pages 214-231.
Crossref
Dezhi Wu, Gregory D. Moody, Jun Zhang & Paul Benjamin Lowry. (2020) Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention. Information & Management 57:5, pages 103235.
Crossref
Salman M. Faizi & Shawon S. M. Rahman. (2020) Effect of Fear on Behavioral Intention to Comply. Effect of Fear on Behavioral Intention to Comply.
Bowen Guan & Carol Hsu. (2020) The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention. Internet Research 30:5, pages 1383-1405.
Crossref
Chongyang Chen, Kem Z.K. Zhang, Xiang Gong, Matthew K.O. Lee & Yaoyu Wang. (2019) Decreasing the problematic use of an information system: An empirical investigation of smartphone game players. Information Systems Journal 30:3, pages 492-534.
Crossref
Rainer Diesch, Matthias Pfaff & Helmut Krcmar. (2020) A comprehensive model of information security factors for decision-makers. Computers & Security 92, pages 101747.
Crossref
Yves Barlette & Annabelle Jaouen. (2020) Information security in SMEs: determinants of CEOs’ protective and supportive behaviors. Systèmes d'information & management Volume 24:3, pages 7-40.
Crossref
Peace Kumah. 2020. Handbook of Research on the Role of Human Factors in IT Project Management. Handbook of Research on the Role of Human Factors in IT Project Management 278 303 .
Moneer Alshaikh, Sean B. Maynard & Atif Ahmad. 2020. Information and Cyber Security. Information and Cyber Security 81 95 .
Laura M. Bishop, Phillip L. Morgan, Phoebe M. Asquith, George Raywood-Burke, Adam Wedgbury & Kevin Jones. 2020. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust 51 66 .
Gershon Hutchinson & Jacques Ophoff. 2020. Information and Cyber Security. Information and Cyber Security 114 130 .
Yousef Mohammad Iriqat, Abd Rahman Ahlan, Nurul Nuha Abdul Molok & Noor Hayani Abd Rahim. (2019) Exploring Staff Perception of InfoSec Policy Compliance: Palestine Universities Empirical Study. Exploring Staff Perception of InfoSec Policy Compliance: Palestine Universities Empirical Study.
Pin Li, Guoli Yang & Chuanqi Wang. (2019) Visual topical analysis of library and information science. Scientometrics 121:3, pages 1753-1791.
Crossref
Anthony Duke Giwah, Ling Wang, Yair Levy & Inkyoung Hur. (2019) Empirical assessment of mobile device users’ information security behavior towards data breach. Journal of Intellectual Capital 21:2, pages 215-233.
Crossref
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam & Paul Benjamin Lowry. (2019) Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Computers & Security 87, pages 101594.
Crossref
Shwadhin Sharma & Merrill Warkentin. (2019) Do I really belong?: Impact of employment status on information security policy compliance. Computers & Security 87, pages 101397.
Crossref
Sebastian Kurowski. (2019) Response biases in policy compliance research. Information & Computer Security 28:3, pages 445-465.
Crossref
Marc Dupuis, Tamara Geiger, Marshelle Slayton & Frances Dewing. (2019) The Use and Non-Use of Cybersecurity Tools Among Consumers. The Use and Non-Use of Cybersecurity Tools Among Consumers.
Karen Renaud & Marc Dupuis. (2019) Cyber security fear appeals. Cyber security fear appeals.
Yaojie Li, Tom Stafford, Bryan Fuller & Selwyn Ellis. (2019) Information Securing in Organizations. Information Securing in Organizations.
Zauwiyah Ahmad, Thian Song Ong, Tze Hui Liew & Mariati Norhashim. (2019) Security monitoring and information security assurance behaviour among employees. Information & Computer Security 27:2, pages 165-188.
Crossref
Hiep Cong Pham, Linda Brennan & Steven Furnell. (2019) Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and Applications 46, pages 96-107.
Crossref
Jurjen Jansen & Paul van Schaik. (2019) The design and evaluation of a theory-based intervention to promote security behaviour against phishing. International Journal of Human-Computer Studies 123, pages 40-55.
Crossref
John D'Arcy & Paul Benjamin Lowry. (2017) Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. Information Systems Journal 29:1, pages 43-69.
Crossref
Kent Marett, Ali Vedadi & Alexandra Durcikova. (2019) A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. Computers & Security 80, pages 25-35.
Crossref
Jason X. S. Wu & Shan Liu. 2019. Data Science and Digital Business. Data Science and Digital Business 81 119 .
A. J. Burns, Tom L. Roberts, Clay Posey, Rebecca J. Bennett & James F. Courtney. (2017) Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts. Decision Sciences 49:6, pages 1187-1228.
Crossref
Jian Hua, Yan Chen & Xin (Robert) Luo. (2018) Are we ready for cyberterrorist attacks?—Examining the role of individual resilience. Information & Management 55:7, pages 928-938.
Crossref
Tejaswini Herath, Myung-Seong Yim, John D’Arcy, Kichan Nam & H.R. Rao. (2018) Examining employee security violations: moral disengagement and its environmental influences. Information Technology & People 31:6, pages 1135-1162.
Crossref
Peace Kumah, Winfred Yaokumah & Charles Buabeng-Andoh. (2018) Identifying HRM Practices for Improving Information Security Performance. International Journal of Human Capital and Information Technology Professionals 9:4, pages 23-43.
Crossref
Hong-Je Lee, Eun-Hee Roh & Kyeong-Seok Han. (2018) A Study on Factors Affecting the Investment Intention of Information Security. Journal of Digital Contents Society 19:8, pages 1515-1525.
Crossref
Soohyun Jeon, Anat Hovav, Jinyoung Han & Steven Alter. (2018) Rethinking the Prevailing Security Paradigm. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:3, pages 54-77.
Crossref
Jurjen Jansen & Paul van Schaik. (2018) Persuading end users to act cautiously online: a fear appeals study on phishing. Information & Computer Security 26:3, pages 264-276.
Crossref
Frederick Pobee & Daniel Opoku. (2018) Factors Influencing the Development of Information Systems Disaster Recovery Plan in the Ghanaian Banking Industry. International Journal of Strategic Decision Sciences 9:3, pages 127-144.
Crossref
Wei Gao, Zhaopeng Liu, Qingqing Guo & Xue Li. (2018) The dark side of ubiquitous connectivity in smartphone-based SNS: An integrated model from information perspective. Computers in Human Behavior 84, pages 185-193.
Crossref
Philip Menard, Merrill Warkentin & Paul Benjamin Lowry. (2018) The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Computers & Security 75, pages 147-166.
Crossref
Robert Willison & Paul Benjamin Lowry. (2018) Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:SI, pages 81-102.
Crossref
Jeffrey D. Wall & Rahul Singh. (2018) The Organization Man and the Innovator. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:SI, pages 67-80.
Crossref
Anthony Duke Giwah. (2018) User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory. User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory.
Chul Woo Yoo, G. Lawrence Sanders & Robert P. Cerveny. (2018) Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance. Decision Support Systems 108, pages 107-118.
Crossref
Salvatore Aurigemma & Thomas Mattson. (2018) Exploring the effect of uncertainty avoidance on taking voluntary protective security actions. Computers & Security 73, pages 219-234.
Crossref
Princely Ifinedo. (2018) Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions. Information Resources Management Journal 31:1, pages 53-82.
Crossref
Nik Thompson, Tanya Jane McGill & Xuequn Wang. (2017) “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security 70, pages 376-391.
Crossref
Stefan Schwerd & Richard Mayr. (2017) INTRODUCING A THEORETIC MODEL AND AN EMPIRIC NORM FOR INFORMATION RISK MANAGEMENT IN DECISION MAKING. Problems of Management in the 21st Century 12:1, pages 39-53.
Crossref
A.J. Burns, Clay Posey, Tom L. Roberts & Paul Benjamin Lowry. (2017) Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals. Computers in Human Behavior 68, pages 190-209.
Crossref
Paul Benjamin Lowry, Jun Zhang, Chuang Wang & Mikko Siponen. (2016) Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model. Information Systems Research 27:4, pages 962-986.
Crossref
Anat Hovav & Frida Ferdani Putri. (2016) This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy. Pervasive and Mobile Computing 32, pages 35-49.
Crossref
Paul Benjamin Lowry, John D’Arcy, Bryan Hammer & Gregory D. Moody. (2016) “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. The Journal of Strategic Information Systems 25:3, pages 232-240.
Crossref
Sk Md Mashrur, Kaili Wang, Brenden Lavoie & Khandker Mohammed Nurul Habib. (2022) What Can Bring Transit Ridership Back: An Econometric Study on the Potential of Usage Incentives and Operational Policies in the Greater Toronto Area. SSRN Electronic Journal.
Crossref
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta & Jason Thatcher. (2020) Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.