966
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Self-efficacy in Information Security: A Replication Study

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon

References

  • Rhee HS, Kim C, Ryu YU. Self-efficacy in information security: its influence on end users’ information security practice behavior PRINTDATE \* MERGEFORMAT. Comput Sec. 2009;28(8):816–26. doi:10.1016/j.cose.2009.05.008.
  • Balozian P, Leidner D. IS security menace: when security creates insecurity. In: 37th International Conference on Information Systems; 2016; Dublin.
  • Warkentin M, Willison R. Behavioral and policy issues in information systems security: the insider threat. Eur J Inf Syst. 2009;18(2):101–05. doi:10.1057/ejis.2009.12.
  • Verizon. Insider Threat 2020 Report. Verison; 2020.
  • Crossler RE, Johnston AC, Lowry PB, Hu Q, Warkentin M, Baskerville R. Future directions for behavioral information security research. Comput Sec. 2013;32:90–101. doi:10.1016/j.cose.2012.09.010.
  • Hu Q, Xu Z, Dinev T, Ling H. Does deterrence work in reducing information security policy abuse by employees? Commun ACM. 2011;54(6):54–60. doi:10.1145/1953122.1953142.
  • Ifinedo P. Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput Sec. 2012;31(1):83–95. doi:10.1016/j.cose.2011.10.007.
  • Chen Y, Galletta DF, Lowry PB, Luo X, Moody GD, Willison R. Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model. Inf Syst Res. 2021;32(3):1043–65. doi:10.1287/isre.2021.1014.
  • Balozian P, Leidner D, Xue B. Toward an intellectual capital cyber security theory: insights from Lebanon. J Intellect Cap. Forthcoming.
  • Nord JH, Floyd K, Paliszkiewicz J. Impact of habits on information security policy compliance. Issues Inf Syst. 2020;21:217–26.
  • Johnston AC, Warkentin M, McBride M, Carter L. Dispositional and situational factors: influences on information security policy violations. Eur J Inf Syst. 2016;25(3):231–51. doi:10.1057/ejis.2015.15.
  • Herath T, Rao HR. Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis Support Syst. 2009;47(2):154–65. doi:10.1016/j.dss.2009.02.005.
  • Cheng L, Li Y, Li W, Holm E, Zhai Q. Understanding the violation of IS security policy in organizations: an integrated model based on social control and deterrence theory. Comput Sec. 2013;39:447–59. doi:10.1016/j.cose.2013.09.009.
  • Warkentin M, Johnston AC, Shropshire J. The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. Eur J Inf Syst. 2011;20(3):267–84. doi:10.1057/ejis.2010.72.
  • Balozian P, Leidner D, Warkentin M. Managers’ and employees’ differing responses to security approaches. J Comput Inf Syst. 2019;59:197–210.
  • Xue B, Xu F, Luo XR, Warkentin M. Ethical leadership and employee ISP violation: exploring dual-mediation paths. Organ Cybersecurity J Pract Process People. 2021;1:5–23.
  • Feng G, Zhu J, Wang N, Liang H. How paternalistic leadership influences IT security policy compliance: the mediating role of the social bond. J Assoc Inf Syst. 2019;20:1650–91.
  • Koohang A, Nowak A, Paliszkiewicz J, Nord JH. Information security policy compliance: leadership, trust, role values, and awareness. J Comput Inf Syst. 2020;60:1–8.
  • Dennis AR, Valacich JS. A replication manifesto. AIS Trans Replication Res. 2014;1(1):1–5. doi:10.17705/1atrr.00001.
  • NTT. Meeting the expectations of a new generation. Risk: Value 2019 Report. NTT Database; 2019.
  • Berthon P, Pitt L, Ewing M, Carr CL. Potential research space in MIS: a framework for envisioning and evaluating research replication, extension, and generation. Inf Syst Res. 2002;13(4):416–27. doi:10.1287/isre.13.4.416.71.
  • Koohang A, Joanna P, Gołuchowski J, Nord JH. Active learning for knowledge construction in E-learning: a replication study. J Comput Inf Syst. 2016;56:238–43.
  • Johnston AC, Warkentin M. Fear appeals and information security behaviors: an empirical study. MIS Q. 2010;34(3):549–66. doi:10.2307/25750691.
  • Siponen M, Mahmood MA, Pahnila S. Employees’ adherence to information security policies: an exploratory field study. Inf Manag. 2014;51(2):217–24. doi:10.1016/j.im.2013.08.006.
  • Bandura A. Self-efficacy: toward a unifying theory of behavioral change. Psychol Rev. 1977;84(2):191–215. doi:10.1037/0033-295X.84.2.191.
  • Compeau DR, Higgins CA. Computer self-efficacy: development of a measure and initial test. MIS Q. 1995;19(2):189–211. doi:10.2307/249688.
  • Chiu S-I. The relationship between life stress and smartphone addiction on Taiwanese university student: a mediation model of learning self-efficacy and social self-efficacy. Comput Human Behav. 2014;34:49–57. doi:10.1016/j.chb.2014.01.024.
  • Yoon J, Vonortas NS, Han S. Do-It-Yourself laboratories and attitude toward use: the effects of self-efficacy and the perception of security and privacy. Technol Forecast Soc Change. 2020;159:120192. doi:10.1016/j.techfore.2020.120192.
  • Mutchler LA. Response awareness and instructional self-efficacy: influences on intent. Inf Comput Secur. 2019;27(4):489–507. doi:10.1108/ICS-05-2018-0061.
  • Ifinedo P. Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition. Inf Manag. 2014;51(1):69–79. doi:10.1016/j.im.2013.10.001.
  • Safa NS, Sookhak M, Von Solms R, Furnell S, Ghani NA, Herawan T. Information security conscious care behaviour formation in organizations. Comput Sec. 2015;53:65–78. doi:10.1016/j.cose.2015.05.012.
  • Venkatesh V, Morris MG, Davis GB, Davis FD. User acceptance of information technology: toward a unified view. MIS Q. 2003;27(3):425–78. doi:10.2307/30036540.
  • Hameed MA, Arachchilage NAG. The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment. Pers Ubiquitous Comput. 2021;25:911–25. doi:10.1007/s00779-021-01560-1.
  • Bandura A. The explanatory and predictive scope of self-efficacy theory. J Soc Clin Psychol. 1986;4(3):359–73. doi:10.1521/jscp.1986.4.3.359.
  • Marakas G, Johnson R, Clay P. The evolving nature of the computer self-efficacy construct: an empirical investigation of measurement construction, validity, reliability and stability over time. J Assoc Inf Syst. 2007;8:15–46.
  • Sullivan JH, Warkentin M, Wallace L. So many ways for handling outliers: what really works and does it matter? J Bus Res. 2021;132:530–43. doi:10.1016/j.jbusres.2021.03.066.
  • Chin WW. The partial least squares approach to structural equation modeling. Mod Methods Bus Res. 1998;295:295–336.
  • Lowry PB, Posey C, Bennett RBJ, Roberts TL. Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust. Inf Syst J. 2015;25(3):193–273. doi:10.1111/isj.12063.
  • Tamjidyamcholo A, Baba MSB, Tamjid H, Gholipour R. Information security–Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language. Comput Educ. 2013;68:223–32. doi:10.1016/j.compedu.2013.05.010.
  • Cuganesan S, Steele C, Hart A. How senior management and workplace norms influence information security attitudes and self-efficacy. Behav Inf Techno. 2018;37(1):50–65. doi:10.1080/0144929X.2017.1397193.
  • Shahri AB, Ismail Z, Mohanna S. The impact of the security competency on “self-efficacy in information security” for effective health information security in Iran. J Med Syst. 2016;40(11):1–9. doi:10.1007/s10916-016-0591-5.
  • Wall JD, Palvia P, Lowry PB. Control-related motivations and information security policy compliance: the role of autonomy and efficacy. J Inf Priv Secur. 2013;9:52–79.
  • Nguyen QN, Kim DJ. Enforcing information security protection: risk propensity and self-efficacy perspectives. In: 50th Hawaii International Conference on System Sciences; 2017; Waikoloa Village.
  • Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 2010;34(3):523–48. doi:10.2307/25750690.
  • Liu C, Wang N, Liang H. Motivating information security policy compliance: the critical role of supervisor-subordinate guanxi and organizational commitment. Int J Inf Manage. 2020;54:102152. doi:10.1016/j.ijinfomgt.2020.102152.
  • Yoo CW, Goo J, Rao HR. Is cybersecurity a team sport? A multilevel examination of workgroup information security effectiveness. MIS Q. 2020;44(2):907–31. doi:10.25300/MISQ/2020/15477.
  • Tang Z, Miller AS, Zhou Z, Warkentin M. Does government social media promote users’ information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Gov Inf Q. 2021;38(2):101572. doi:10.1016/j.giq.2021.101572.
  • Chen X, Chen L, Wu D. Factors that influence employees’ security policy compliance: an awareness-motivation-capability perspective. J Comput Inf Syst. 2018;58:312–24.
  • Blackwood-Brown C, Levy Y, D’Arcy J. Cybersecurity awareness and skills of senior citizens: a motivation perspective. J Comput Inf Syst. 2021;61:195–206.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.