Hao Chen & Yufei Yuan. (2022) The impact of ignorance and bias on information security protection motivation: a case of e-waste handling. Internet Research 33:6, pages 2244-2275.
Crossref
Victoria Kisekka & Sanjay Goel. (2022) An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies. Information Systems Frontiers 25:4, pages 1439-1458.
Crossref
Mansour Naser Alraja, Usman Javed Butt & Maysam Abbod. (2023) Information security policies compliance in a global setting: An employee's perspective. Computers & Security 129, pages 103208.
Crossref
Sinazo Brown, Zainab Ruhwanya & Ayanda Pekane. 2023. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance
432
444
.
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain & Walton Wider. (2022) Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information 13:9, pages 413.
Crossref
Nathan N. Cheek, Elena Reutskaja & Barry Schwartz. (2022) Balancing the Freedom–Security Trade-Off During Crises and Disasters. Perspectives on Psychological Science 17:4, pages 1024-1049.
Crossref
Hwee‐Joo Kam, Dustin K. Ormond, Philip Menard & Robert E. Crossler. (2021) That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training. Information Systems Journal 32:4, pages 888-926.
Crossref
Jeffrey D. Wall, Prashant Palvia & John D’Arcy. (2021) Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios. Information Systems Frontiers 24:2, pages 637-658.
Crossref
Yan Chen, Weidong Xia & Karlene Cousins. (2022) Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Computers & Security 113, pages 102568.
Crossref
Kwame Simpe Ofori, Hod Anyigba, George Oppong Appiagyei Ampong, Osaretin Kayode Omoregie, Makafui Nyamadi & Eli Fianu. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity
213
232
.
Yotamu Gangire, Adéle Da Veiga & Marlien Herselman. (2021) Assessing information security behaviour: a self-determination theory perspective. Information & Computer Security 29:4, pages 625-646.
Crossref
Philip Romero‐Masters & Kristin Eschenfelder. (2021) Autonomy Framing and Cybersecurity Training Completion. Proceedings of the Association for Information Science and Technology 58:1, pages 816-818.
Crossref
Chulwon Lee & Kyungho Lee. (2021) Factors Affecting Corporate Security Policy Effectiveness in Telecommuting. Security and Communication Networks 2021, pages 1-13.
Crossref
Yuxiang Hong & Steven Furnell. (2021) Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications 57, pages 102710.
Crossref
Mada Alassaf & Ali Alkhalifah. (2021) Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review. IEEE Access 9, pages 162687-162705.
Crossref
Soohyun Jeon, Insoo Son & Jinyoung Han. (2020) Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case. Information Technology & People 34:2, pages 599-616.
Crossref
Charlette Donalds & Kweku-Muata Osei-Bryson. (2020) Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management 51, pages 102056.
Crossref
Kwame Simpe Ofori, Hod Anyigba, George Oppong Appiagyei Ampong, Osaretin Kayode Omoregie, Makafui Nyamadi & Eli Fianu. 2020. Modern Theories and Practices for Cyber Ethics and Security Compliance. Modern Theories and Practices for Cyber Ethics and Security Compliance
152
171
.
Alex Koohang, Jonathan Anderson, Jeretta Horn Nord & Joanna Paliszkiewicz. (2019) Building an awareness-centered information security policy compliance model. Industrial Management & Data Systems 120:1, pages 231-247.
Crossref
John Agyekum Addae, Grace Simpson & George Oppong Appiagyei Ampong. (2019) Factors Influencing Information Security Policy Compliance Behavior. Factors Influencing Information Security Policy Compliance Behavior.
Nadine Guhr, Benedikt Lebek & Michael H. Breitner. (2019) The impact of leadership on employees' intended information security behaviour: An examination of the full-range leadership theory. Information Systems Journal 29:2, pages 340-362.
Crossref
Yotamu Gangire, Adele Da Veiga & Marlien Herselman. (2019) A conceptual model of information security compliant behaviour based on the self-determination theory. A conceptual model of information security compliant behaviour based on the self-determination theory.
A. J. Burns, Tom L. Roberts, Clay Posey, Rebecca J. Bennett & James F. Courtney. (2018) Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts. Decision Sciences 49:6, pages 1187-1228.
Crossref
John M. Blythe & Lynne Coventry. (2018) Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Computers in Human Behavior 87, pages 87-97.
Crossref
Aggeliki Tsohou & Philipp Holtkamp. (2018) Are users competent to comply with information security policies? An analysis of professional competence models. Information Technology & People 31:5, pages 1047-1068.
Crossref
Ahmed Alzahrani, Chris Johnson & Saad Altamimi. (2018) Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation. Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation.
Jeffrey D. Wall & Rahul Singh. (2018) The Organization Man and the Innovator. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:SI, pages 67-80.
Crossref
Sadaf Hina & Dhanapal Durai Dominic. (2017) Need for information security policies compliance: A perspective in Higher Education Institutions. Need for information security policies compliance: A perspective in Higher Education Institutions.
Myeonggil Choi. (2016) Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing. Sustainability 8:7, pages 638.
Crossref
Jack Shih-Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung & Paul Benjamin Lowry. (2015) The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness. Information Systems Research 26:2, pages 282-300.
Crossref
Shanna Cooper, Lindsey M. Lavaysse & David E. Gard. (2015) Assessing motivation orientations in schizophrenia: Scale development and validation. Psychiatry Research 225:1-2, pages 70-78.
Crossref