159
Views
38
CrossRef citations to date
0
Altmetric
Original Articles

Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy

Pages 52-79 | Published online: 07 Jul 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (7)

Botong Xue, Merrill Warkentin, Leigh A. Mutchler & Puzant Balozian. (2023) Self-efficacy in Information Security: A Replication Study. Journal of Computer Information Systems 63:1, pages 1-10.
Read now
Charlette Donalds & Corlane Barclay. (2022) Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance. European Journal of Information Systems 31:1, pages 58-73.
Read now
Carlene Blackwood-Brown, Yair Levy & John D’Arcy. (2021) Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective. Journal of Computer Information Systems 61:3, pages 195-206.
Read now
Francesco Bogliacino, Rafael Charris, Camilo Gómez, Felipe Montealegre & Cristiano Codagnone. (2021) Expert endorsement and the legitimacy of public policy. Evidence from Covid19 mitigation strategies. Journal of Risk Research 24:3-4, pages 394-415.
Read now
Alex Koohang, Jeretta Horn Nord, Zoroayka V. Sandoval & Joanna Paliszkiewicz. (2021) Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance. Journal of Computer Information Systems 61:2, pages 99-107.
Read now
W. Alec Cram, Jeffrey G. Proudfoot & John D’Arcy. (2017) Organizational information security policies: a review and research framework. European Journal of Information Systems 26:6, pages 605-641.
Read now
Clay Posey, Tom L. Roberts & Paul Benjamin Lowry. (2015) The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets. Journal of Management Information Systems 32:4, pages 179-214.
Read now

Articles from other publishers (31)

Hao Chen & Yufei Yuan. (2022) The impact of ignorance and bias on information security protection motivation: a case of e-waste handling. Internet Research 33:6, pages 2244-2275.
Crossref
Victoria Kisekka & Sanjay Goel. (2022) An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies. Information Systems Frontiers 25:4, pages 1439-1458.
Crossref
Mansour Naser Alraja, Usman Javed Butt & Maysam Abbod. (2023) Information security policies compliance in a global setting: An employee's perspective. Computers & Security 129, pages 103208.
Crossref
Sinazo Brown, Zainab Ruhwanya & Ayanda Pekane. 2023. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance 432 444 .
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain & Walton Wider. (2022) Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information 13:9, pages 413.
Crossref
Nathan N. Cheek, Elena Reutskaja & Barry Schwartz. (2022) Balancing the Freedom–Security Trade-Off During Crises and Disasters. Perspectives on Psychological Science 17:4, pages 1024-1049.
Crossref
Hwee‐Joo Kam, Dustin K. Ormond, Philip Menard & Robert E. Crossler. (2021) That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training. Information Systems Journal 32:4, pages 888-926.
Crossref
Jeffrey D. Wall, Prashant Palvia & John D’Arcy. (2021) Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios. Information Systems Frontiers 24:2, pages 637-658.
Crossref
Yan Chen, Weidong Xia & Karlene Cousins. (2022) Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Computers & Security 113, pages 102568.
Crossref
Kwame Simpe Ofori, Hod Anyigba, George Oppong Appiagyei Ampong, Osaretin Kayode Omoregie, Makafui Nyamadi & Eli Fianu. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 213 232 .
Yotamu Gangire, Adéle Da Veiga & Marlien Herselman. (2021) Assessing information security behaviour: a self-determination theory perspective. Information & Computer Security 29:4, pages 625-646.
Crossref
Philip Romero‐Masters & Kristin Eschenfelder. (2021) Autonomy Framing and Cybersecurity Training Completion. Proceedings of the Association for Information Science and Technology 58:1, pages 816-818.
Crossref
Chulwon Lee & Kyungho Lee. (2021) Factors Affecting Corporate Security Policy Effectiveness in Telecommuting. Security and Communication Networks 2021, pages 1-13.
Crossref
Yuxiang Hong & Steven Furnell. (2021) Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications 57, pages 102710.
Crossref
Mada Alassaf & Ali Alkhalifah. (2021) Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review. IEEE Access 9, pages 162687-162705.
Crossref
Soohyun Jeon, Insoo Son & Jinyoung Han. (2020) Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case. Information Technology & People 34:2, pages 599-616.
Crossref
Charlette Donalds & Kweku-Muata Osei-Bryson. (2020) Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management 51, pages 102056.
Crossref
Kwame Simpe Ofori, Hod Anyigba, George Oppong Appiagyei Ampong, Osaretin Kayode Omoregie, Makafui Nyamadi & Eli Fianu. 2020. Modern Theories and Practices for Cyber Ethics and Security Compliance. Modern Theories and Practices for Cyber Ethics and Security Compliance 152 171 .
Alex Koohang, Jonathan Anderson, Jeretta Horn Nord & Joanna Paliszkiewicz. (2019) Building an awareness-centered information security policy compliance model. Industrial Management & Data Systems 120:1, pages 231-247.
Crossref
John Agyekum Addae, Grace Simpson & George Oppong Appiagyei Ampong. (2019) Factors Influencing Information Security Policy Compliance Behavior. Factors Influencing Information Security Policy Compliance Behavior.
Nadine Guhr, Benedikt Lebek & Michael H. Breitner. (2019) The impact of leadership on employees' intended information security behaviour: An examination of the full-range leadership theory. Information Systems Journal 29:2, pages 340-362.
Crossref
Yotamu Gangire, Adele Da Veiga & Marlien Herselman. (2019) A conceptual model of information security compliant behaviour based on the self-determination theory. A conceptual model of information security compliant behaviour based on the self-determination theory.
A. J. Burns, Tom L. Roberts, Clay Posey, Rebecca J. Bennett & James F. Courtney. (2018) Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts. Decision Sciences 49:6, pages 1187-1228.
Crossref
John M. Blythe & Lynne Coventry. (2018) Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Computers in Human Behavior 87, pages 87-97.
Crossref
Aggeliki Tsohou & Philipp Holtkamp. (2018) Are users competent to comply with information security policies? An analysis of professional competence models. Information Technology & People 31:5, pages 1047-1068.
Crossref
Ahmed Alzahrani, Chris Johnson & Saad Altamimi. (2018) Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation. Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation.
Jeffrey D. Wall & Rahul Singh. (2018) The Organization Man and the Innovator. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:SI, pages 67-80.
Crossref
Sadaf Hina & Dhanapal Durai Dominic. (2017) Need for information security policies compliance: A perspective in Higher Education Institutions. Need for information security policies compliance: A perspective in Higher Education Institutions.
Myeonggil Choi. (2016) Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing. Sustainability 8:7, pages 638.
Crossref
Jack Shih-Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung & Paul Benjamin Lowry. (2015) The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness. Information Systems Research 26:2, pages 282-300.
Crossref
Shanna Cooper, Lindsey M. Lavaysse & David E. Gard. (2015) Assessing motivation orientations in schizophrenia: Scale development and validation. Psychiatry Research 225:1-2, pages 70-78.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.