1,243
Views
122
CrossRef citations to date
0
Altmetric
Original Article

The influence of the informal social learning environment on information privacy policy compliance efficacy and intention

, &
Pages 267-284 | Received 29 Sep 2009, Accepted 08 Dec 2010, Published online: 19 Dec 2017

References

  • AndrichDA rating formulation for ordered response categoriesPyschometirka197843456157310.1007/BF02293814
  • AndersonCAgarwalRPracticing safe computing: a multimethod empirical examination of home computer user security behavioural intentionsMIS Quarterly2010343613643
  • AndersonRBCognitive appraisal of performance capability in the prevention of drunken driving: a test of self-efficacy theoryJournal of Public Relations Research19957320522910.1207/s1532754xjprr0703_03
  • BaronRKennyDThe moderator-mediator variable distinction in social psychological research: conceptual, strategic and statistical considerationsJournal of Personality and Social Psychology19865111173118210.1037/0022-3514.51.6.1173
  • BarclayLSocial learning theory: a framework for discrimination researchAcademy of Management Review198274587594
  • BanduraAA social learning interpretation of psychological dysfunctionsFoundations of Abnormal Psychology1968293344
  • BanduraASelf-efficacy: toward a unifying theory of behavioral changePsychological Review197784219121510.1037/0033-295X.84.2.191
  • BanduraASocial Foundations of Thought and Action1986
  • BanduraAOrganizational applications of social cognitive theoryAustralian Journal of Management198813227510.1177/031289628801300210
  • BanduraACervoneDDifferential engagement of self-reactive influences in cognitive motivationOrganizational Behavior & Human Decision Processes19863819211410.1016/0749-5978(86)90028-2
  • BloomPNMilneGRAdlerRAvoiding misuse of information technologies: legal and societal considerationsJournal of Marketing19945819811010.2307/1252254
  • BollenKStructural Equations with Latent Variables1989
  • BossSRKirschLJAngermeierIShinglerRABossRWIf someone is watching, I’ll do what I’m asked: mandatoriness, control, and information securityEuropean Journal of Information Systems200918215116410.1057/ejis.2009.8
  • BulgurcuBCavusogluHBenbasatIInformation security policy compliance: an empirical study of rationality-based beliefs and information security awarenessMIS Quarterly2010343523548
  • CarrJSequeiraJPrior family business exposure as intergenerational influence and entrepreneurial intent: a theory of planned behavior approachJournal of Business Research200760101090109810.1016/j.jbusres.2006.12.016
  • CenfetelliRBasselierGInterpretation of formative measurement in IS researchMIS Quarterly2009334689707
  • ChinWPartial least squares is to Lisrel as principal components analysis is to common factor analysisTechnology Studies19952315319
  • ChinWThe partial least squares approach to structural equation modellingModern Methods for Business Research1998295336
  • CompeauDHigginsCAComputer self-efficacy: development of a measure and initial testMIS Quarterly199519218921110.2307/249688
  • CrittendenWFA social learning theory of cross-functional case educationJournal of Business Research200558796096610.1016/j.jbusres.2003.12.005
  • D’arcyJHovavAGalettaDUser awareness of security countermeasures and its impact on information systems misuse: a deterrence approachInformation Systems Research2009201799810.1287/isre.1070.0160
  • DhillonGViolation of safeguards by trusted personnel and understanding related information security concernsComputers & Security200120216517310.1016/S0167-4048(01)00209-7
  • DiamantopoulosAWinklhoferHIndex construction with formative indicators: an alternative to scale developmentJournal of Marketing Research200138226927710.1509/jmkr.38.2.269.18845
  • DinevTBellottoMHartPRussoVSerraIColauttiCPrivacy calculus model in e-commerce – a study of Italy and the Unites StatesEuropean Journal of Information Systems200615438940210.1057/palgrave.ejis.3000590
  • FedorowiczJRayAImpact of HIPAA on the integrity of healthcare informationInternational Journal of Healthcare Technology & Management20046214215710.1504/IJHTM.2004.004954
  • FishbeinMAjzenIBelief, Attitude, Intention and Behavior: An Introduction to Theory and Research1975
  • FishbeinMCappellaJNThe role of theory in developing effective health communicationsJournal of Communication200656s1s1s1710.1111/j.1460-2466.2006.00280.x
  • FornellCBooksteinFTwo structural equation models: LISREL and PLS applied to consumer exit-voice theoryJournal of Marketing Research19821944045210.2307/3151718
  • FurnellSGennatouMDowlandPA prototype tool for information security awareness and trainingLogistics Information Management2002155/635235710.1108/09576050210447037
  • GefenDStraubDBoudreauMStructural equation modelling techniques and regression: guidelines for research practiceCommunications of AIS200077178
  • GistMMitchellTSelf-efficacy: a theoretical analysis of its determinants and malleabilityAcademy of Management Review1992172183211
  • Goodhue DL and Straub DW (1989) Security concerns of system users: a proposed study of user perceptions of the adequacy of security measures. In Proceedings of the 21st Hawaii International Conference on System Science (HICSS), Kona, HA, January.
  • Gupta A (2008) Prescription for change. Wall Street Journal, 20 October.
  • HerathTRaoHRProtection motivation and deterrence: a framework for security policy compliance in organisationsEuropean Journal of Information Systems200918210612510.1057/ejis.2009.6
  • HillTSmithNMannMCommunicating innovations: convincing computer phobics to adopt innovative technologiesAdvances in Consumer Research1986419422
  • HillTSmithNMannMRole of efficacy expectations in predicting the decision to use advanced technologies: the case of computersJournal of Applied Psychology198772230731310.1037/0021-9010.72.2.307
  • HofferJAStraubDWThe 9 to 5 underground: are you policing computer crimes?Sloan Management Review19893043543
  • Horowitz BT (2010) Data breaches cost health care industry $6 billion annually. eWeek Magazine, 10 November.
  • JarvisCMackenzieSPodsakoffPMickDA critical review of construct indicators and measurement model misspecification in marketing and consumer researchJournal of Consumer Research200330219921810.1086/376806
  • JohnstonACWarkentinMFear appeals and information security behaviours: an empirical studyMIS Quarterly2010343549566
  • KanferRAckermanPLMotivation and cognitive abilities: an integrative/aptitude-treatment interaction approach to skill acquisitionJournal of Applied Psychology198974465769010.1037/0021-9010.74.4.657
  • KerlingerFFoundations of Behavioral Research1973
  • LangenderferJCookDLOh, what a tangled web we weave: the state of privacy protection in the information economy and recommendations for governanceJournal of Business Research200457473474710.1016/S0148-2963(02)00359-4
  • LeachJImproving user security behaviourComputers & Security200322868569210.1016/S0167-4048(03)00007-5
  • LaceyDManaging the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers2009
  • LeeYLarsenKRThreat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware softwareEuropean Journal of Information Systems200918217718710.1057/ejis.2009.11
  • LochKStraubDKamelSDiffusing the internet in the Arab world: the role of social norms and technological culturationIEEE Transactions on Engineering Management2003501456410.1109/TEM.2002.808257
  • MackenzieSPodsakoffPJarvisCThe problem of measurement model misspecification in behavioral and organizational research and some recommended solutionsJournal of Applied Psychology200590471073010.1037/0021-9010.90.4.710
  • ManzCCSimsHPJr.Vicarious learning: the influence of modeling on organizational behaviorAcademy of Management Review198161105113
  • MarakasGYiMJohnsonRThe multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for researchInformation Systems Research19989212616310.1287/isre.9.2.126
  • MathieuJEMartineauJWTannenbaumSIIndividual and situational influences on the development of self-efficacy: implications for training effectivenessPersonnel Psychology199346112514710.1111/j.1744-6570.1993.tb00870.x
  • MathieuJETannenbaumSISalasEInfluences of individual and situational characteristics on measures of training effectivenessAcademy of Management Journal199235482884710.2307/256317
  • MercuriRTThe HIPAA-potamus in health care data securityCommunications of the ACM2004477252810.1145/1005817.1005840
  • MyyryLSiponenMPahnilaSVartiainenTVanceAWhat levels of moral reasoning and values explain adherence to information security rules? An empirical studyEuropean Journal of Information Systems200918212613910.1057/ejis.2009.10
  • NunnallyJCBernsteinIHPsychometric Theory1994
  • Pahnila S, Siponen M and Mahmood A (2007) Employees’ behavior towards IS security policy compliance. In Proceedings of the 40th Hawaii International Conference on System Sciences.
  • PetersLHO’ConnorEJSituational constraints and work outcomes: the influences of a frequently overlooked constructAcademy of Management Review198053391397
  • PetersLHO’ConnorEJEulbergJRWatsonTWAn examination of situational constraints in air force work settingsHuman Performance19881213314410.1207/s15327043hup0102_4
  • PetterSStraubDWRaiASpecifying formative constructs in is researchMIS Quarterly2007314623656
  • PhillipsJSFreedmanSMSituational performance constraints and task characteristics: their relationship to motivation and satisfactionJournal of Management198410332133110.1177/014920638401000305
  • PodsakoffPMOrganDSelf-reports in organizational research: problems and prospectsJournal of Management198612453154410.1177/014920638601200408
  • PodsakoffPMMackenzieSBLeeJYPodsakoffNPCommon method biases in behavioral research: a critical review of the literature and recommended remediesJournal of Applied Psychology200388587990310.1037/0021-9010.88.5.879
  • RadcliffSCommentary: legal effect of revealing private information in the US and abroadInformation Systems Management200724434334410.1080/10580530701586086
  • Ralls RS and Klein KJ (1991) Trainee cognitive ability and motivation: Effects on computer training performance. In Proceedings of the 6th Annual Conference of Industrial and Organizational Psychology.
  • RennieLResearch note: detecting a response set to likert-style attitude items with the rating modelEducation Research and Perspectives198291114118
  • RheeHSKimCRyuYUSelf-efficacy in information security: its influence on end users’ information security practice behaviorComputers & Security200928681682610.1016/j.cose.2009.05.008
  • Ringle C, Wende S and Will A (2005) SmartPLS 2.0 (beta). [WWW] document www.smartpls.de.
  • RobinsonTData security in the age of complianceNetworker200593243010.1145/1086762.1086764
  • RotterJBSome implications of a social learning theory for the prediction of goal directed behavior from testing proceduresPsychological Review19606730131610.1037/h0039601
  • SalganikMJHeckathordDDSampling and estimation in hidden populations using respondent-driven samplingSociological Methodology200434119323910.1111/j.0081-1750.2004.00152.x
  • SasseMABrostoffSWeirichDTransforming the ‘weakest link’ – a human/computer interaction approach to usable and effective securityBT Technology Journal200119312213110.1023/A:1011902718709
  • SchunkDHAbility versus effort attributional feedback: differential effects on self-efficacy and achievementJournal of Educational Psychology198375684885610.1037/0022-0663.75.6.848
  • SchunkDHSequential attributional feedback and children's achievement behaviorJournal of Educational Psychology19847651159116910.1037/0022-0663.76.6.1159
  • SheppardBHartwickJWarshawPThe theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future researchJournal of Consumer Research198815332534310.1086/209170
  • ShenJJSamsonLFWashingtonELJohnsonPEdwardsCMaloneABarriers of HIPAA regulation to implementation of health services researchJournal of Medical Systems2006301656910.1007/s10916-006-7406-z
  • SiponenMTA conceptual foundation for organizational information assurance awarenessInformation Management and Computer Security200081314110.1108/09685220010371394
  • SiponenMTAn analysis of the recent IS security development approaches: descriptive and prescriptive implicationsInformation Security Management – Global Challenges in the Next Millennium2001
  • SiponenMVanceANeutralization: new insights into the problem of employee information systems security policy violationsMIS Quarterly2010343487502
  • StantonJMStamKRMastrangeloPMJoltonJAAnalysis of end user security behaviorsComputers & Security200524212413310.1016/j.cose.2004.07.001
  • StraubDEffective IS security: an empirical studyInformation Systems Research19901325527610.1287/isre.1.3.255
  • StraubDWBoudreauMCGefenDValidation guidelines for IS positivist researchCommunications of AIS20041363380427
  • StraubDWWelkeRJCoping with system risk: security planning models for management decision makingMIS Quarterly199822444146410.2307/249551
  • SulskyLMKlineTJUnderstanding frame-of-reference training success: a social learning theory perspectiveInternational Journal of Training and Development200711212113110.1111/j.1468-2419.2007.00273.x
  • TorkzadehGVan dykeTPEffects of training on internet self-efficacy and computer user attitudesComputers in Human Behavior200218547949410.1016/S0747-5632(02)00010-9
  • Van vianenAEManagerial self-efficacy, outcome expectancies, and work-role salience as determinants of ambition for a managerial positionJournal of Applied Social Psychology199929363966510.1111/j.1559-1816.1999.tb01406.x
  • VogtNCan privacy compliance be monitored?Journal of Health Care Compliance2005745658
  • VroomCVon solmsRTowards information security behavioural complianceComputers & Security200423319119810.1016/j.cose.2004.01.012
  • WarkentinMWillisonRBehavioral and policy issues in information systems security: the insider threatEuropean Journal of Information Systems200918210110510.1057/ejis.2009.12
  • WexleyKNLathamGPDeveloping and Training Human Resources in Organizations1991
  • WhitmanEMMattordHJMaking users mindful of IT security; awareness training is vital to keeping the idea of IT security uppermost in employees’ mindsSecurity Management200448113234
  • WillisonRBackhouseJOpportunities for computer crime: considering systems risk from a criminological perspectiveEuropean Journal of Information Systems200615440341410.1057/palgrave.ejis.3000592
  • WorkmanMBommerWHStraubDSecurity lapses and the omission of information security measures: a threat control model and empirical testComputer in Human Behavior20082462799281610.1016/j.chb.2008.04.005

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.