Organizational Determinants and Compliance Behavior to Shape Information Security Plan
Author
Abstract
Suggested Citation
DOI: https://doi.org/10.36941/ajis-2023-0151
Download full text from publisher
References listed on IDEAS
- Joshua Davis & Deepti Agrawal & Xiang Guo, 2023. "Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment," European Journal of Information Systems, Taylor & Francis Journals, vol. 32(2), pages 195-206, March.
- Paul Benjamin Lowry & Tamara Dinev & Robert Willison, 2017. "Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda," European Journal of Information Systems, Taylor & Francis Journals, vol. 26(6), pages 546-563, November.
- Suresh Cuganesan & Cara Steele & Alison Hart, 2018. "How senior management and workplace norms influence information security attitudes and self-efficacy," Behaviour and Information Technology, Taylor & Francis Journals, vol. 37(1), pages 50-65, January.
- Elina Niemimaa & Marko Niemimaa, 2017. "Information systems security policy implementation in practice: from best practices to situated practices," European Journal of Information Systems, Taylor & Francis Journals, vol. 26(1), pages 1-20, January.
- Clay Posey & Uzma Raja & Robert E. Crossler & A. J. Burns, 2017. "Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA," European Journal of Information Systems, Taylor & Francis Journals, vol. 26(6), pages 585-604, November.
- Adel M. Qatawneh, 2023. "The Role of Employee Empowerment in Supporting Accounting Information Systems Outcomes: A Mediated Model," Sustainability, MDPI, vol. 15(9), pages 1-16, April.
- Emilio J. Castilla & Aruna Ranganathan, 2020. "The Production of Merit: How Managers Understand and Apply Merit in the Workplace," Organization Science, INFORMS, vol. 31(4), pages 909-935, July.
- Gilbert K. Amoako & Anokye M. Adam & George Tackie & Clement Lamboi Arthur, 2021. "Environmental Accountability Practices of Environmentally Sensitive Firms in Ghana: Does Institutional Isomorphism Matter?," Sustainability, MDPI, vol. 13(17), pages 1-14, August.
- Tatyana Bondarouk & Klaas Sikkel, 2005. "Explaining IT Implementation Through Group Learning," Information Resources Management Journal (IRMJ), IGI Global, vol. 18(1), pages 42-60, January.
- Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo, 2021. "The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence," Information Systems Frontiers, Springer, vol. 23(2), pages 361-373, April.
- Merrill Warkentin & Robert Willison, 2009. "Behavioral and policy issues in information systems security: the insider threat," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 101-105, April.
- Yan Chen & Dennis F. Galletta & Paul Benjamin Lowry & Xin (Robert) Luo & Gregory D. Moody & Robert Willison, 2021. "Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model," Information Systems Research, INFORMS, vol. 32(3), pages 1043-1065, September.
- Li, Yuanxiang John & Hoffman, Elizabeth, 2023. "Designing an incentive mechanism for information security policy compliance: An experiment," Journal of Economic Behavior & Organization, Elsevier, vol. 212(C), pages 138-159.
- Mikko Siponen & Anthony Vance, 2014. "Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations," European Journal of Information Systems, Taylor & Francis Journals, vol. 23(3), pages 289-305, May.
- Tejaswini Herath & H Raghav Rao, 2009. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 106-125, April.
- Benedikt Lebek & Jörg Uffen & Markus Neumann & Bernd Hohler & Michael H. Breitner, 2014. "Information security awareness and behavior: a theory-based literature review," Management Research Review, Emerald Group Publishing Limited, vol. 37(12), pages 1049-1092, November.
- Joel R. Motaung & Portia Pearl Siyanda Sifolo, 2023. "Benefits and Barriers of Digital Procurement: Lessons from an Airport Company," Sustainability, MDPI, vol. 15(5), pages 1-18, March.
- Giovani Cruzara & José Roberto Frega & Ana Paula Mussi Szabo Cherobim & Emanuel Campigotto Sandri, 2023. "Business Models, Dynamic Capabilities and Industry 4.0: A Framework to Explore This Relationship," International Journal of Innovation and Technology Management (IJITM), World Scientific Publishing Co. Pte. Ltd., vol. 20(06), pages 1-31, October.
- Giuseppe Cascavilla & Mauro Conti & David G. Schwartz & Inbal Yahav, 2018. "The insider on the outside: a novel system for the detection of information leakers in social networks," European Journal of Information Systems, Taylor & Francis Journals, vol. 27(4), pages 470-485, July.
- Eva Boxenbaum & Stefan Jonsson, 2017. "Isomorphism, diffusion and decoupling: Concept evolution and theoretical challenges," Post-Print hal-01488051, HAL.
- Wenqin Li & Rongmin Liu & Linhui Sun & Zigu Guo & Jie Gao, 2022. "An Investigation of Employees’ Intention to Comply with Information Security System—A Mixed Approach Based on Regression Analysis and fsQCA," IJERPH, MDPI, vol. 19(23), pages 1-19, November.
- Fatin Nabilah Abd Razak & Aliza Ramli & Zarinah Abdul Rasit, 2020. "Organisation Isomorphism as Determinants of Environmental Management Accounting Practices in Malaysian Public Listed Companies," Humanities and Social Sciences Letters, Conscientia Beam, vol. 8(1), pages 110-122.
- Peter Meso & Yi Ding & Shuting Xu, 2013. "Applying Protection Motivation Theory to Information Security Training for College Students," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 9(1), pages 47-67, January.
- Noor Suhani Sulaiman & Muhammad Ashraf Fauzi & Walton Wider & Jegatheesan Rajadurai & Suhaidah Hussain & Siti Aminah Harun, 2022. "Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review," Social Sciences, MDPI, vol. 11(9), pages 1-17, August.
- Karianne Kalshoven & Scott Taylor, 2018. "Leadership: Philosophical Perspectives and Qualitative Analysis of Ethics—Looking Back, Looking Forward, Looking Around," Journal of Business Ethics, Springer, vol. 148(1), pages 1-3, March.
- Samson Iliya Nyahas & John C. Munene & Laura Orobia & Twaha Kigongo Kaawaase, 2017. "Isomorphic influences and voluntary disclosure: The mediating role of organizational culture," Cogent Business & Management, Taylor & Francis Journals, vol. 4(1), pages 1351144-135, January.
- Charles J. Kacmar & Susan S. Fiorito & Jane M. Carey, 2009. "The Influence of Attitude on the Acceptance and Use of Information Systems," Information Resources Management Journal (IRMJ), IGI Global, vol. 22(2), pages 22-49, April.
- A. J. Burns & Clay Posey & James F. Courtney & Tom L. Roberts & Prabhashi Nanayakkara, 2017. "Organizational information security as a complex adaptive system: insights from three agent-based models," Information Systems Frontiers, Springer, vol. 19(3), pages 509-524, June.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Yan Chen & Dennis F. Galletta & Paul Benjamin Lowry & Xin (Robert) Luo & Gregory D. Moody & Robert Willison, 2021. "Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model," Information Systems Research, INFORMS, vol. 32(3), pages 1043-1065, September.
- A. J. Burns & Tom L. Roberts & Clay Posey & Paul Benjamin Lowry & Bryan Fuller, 2023. "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," Information Systems Research, INFORMS, vol. 34(1), pages 342-362, March.
- Gilbert K. Amoako & Anokye M. Adam & George Tackie & Clement Lamboi Arthur, 2021. "Environmental Accountability Practices of Environmentally Sensitive Firms in Ghana: Does Institutional Isomorphism Matter?," Sustainability, MDPI, vol. 13(17), pages 1-14, August.
- Obi M. Ogbanufe & Corey Baham, 2023. "Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret," Information Systems Frontiers, Springer, vol. 25(2), pages 897-916, April.
- Bitrián, Paula & Buil, Isabel & Catalán, Sara & Merli, Dominik, 2024. "Gamification in workforce training: Improving employees’ self-efficacy and information security and data protection behaviours," Journal of Business Research, Elsevier, vol. 179(C).
- Li, Yuanxiang John & Hoffman, Elizabeth, 2023. "Designing an incentive mechanism for information security policy compliance: An experiment," Journal of Economic Behavior & Organization, Elsevier, vol. 212(C), pages 138-159.
- Victoria Kisekka & Sanjay Goel, 2023. "An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies," Information Systems Frontiers, Springer, vol. 25(4), pages 1439-1458, August.
- Muel Kaptein, 2023. "A Paradox of Ethics: Why People in Good Organizations do Bad Things," Journal of Business Ethics, Springer, vol. 184(1), pages 297-316, April.
- Bhukya, Ramulu & Paul, Justin, 2023. "Social influence research in consumer behavior: What we learned and what we need to learn? – A hybrid systematic literature review," Journal of Business Research, Elsevier, vol. 162(C).
- Sharma, Amalesh & Moses, Aditya Christopher & Borah, Sourav Bikash & Adhikary, Anirban, 2020. "Investigating the impact of workforce racial diversity on the organizational corporate social responsibility performance: An institutional logics perspective," Journal of Business Research, Elsevier, vol. 107(C), pages 138-152.
- Xiangyu Chang & Yinghui Huang & Mei Li & Xin Bo & Subodha Kumar, 2021. "Efficient Detection of Environmental Violators: A Big Data Approach," Production and Operations Management, Production and Operations Management Society, vol. 30(5), pages 1246-1270, May.
- Muhammad Iskandar Hamzah, 2024. "Fear of COVID-19 disease and QR-based mobile payment adoption: a protection motivation perspective," Journal of Financial Services Marketing, Palgrave Macmillan, vol. 29(3), pages 946-963, September.
- Hou, Tingting & Luo, Xin (Robert) & Ke, Dan & Cheng, Xusen, 2022. "Exploring different appraisals in deviant sharing behaviors: A mixed-methods study," Journal of Business Research, Elsevier, vol. 139(C), pages 496-509.
- Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
- Qin Yang & Young-Chan Lee, 2021. "Why Do People Hide Knowledge in the Online Knowledge Community? An Integrated Framework of Protection Motivation, Self-Determination, and Social Exchange Beliefs," Sustainability, MDPI, vol. 13(17), pages 1-24, September.
- Martin Stangborli Time & Frode Veggeland, 2020. "Adapting to a Global Health Challenge: Managing Antimicrobial Resistance in the Nordics," Politics and Governance, Cogitatio Press, vol. 8(4), pages 53-64.
- Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
- A. F. Salam & Hua Dai & Lei Wang, 2022. "Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment," Information Systems Frontiers, Springer, vol. 24(6), pages 1929-1948, December.
- Martin Stangborli Time & Frode Veggeland, 2020. "Adapting to a Global Health Challenge: Managing Antimicrobial Resistance in the Nordics," Politics and Governance, Cogitatio Press, vol. 8(4), pages 384-395.
- Negash, Minga & Lemma, Tesfaye T. & Samkin, Grant, 2019. "Factors impacting accounting research output in developing countries: An exploratory study," The British Accounting Review, Elsevier, vol. 51(2), pages 170-192.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bjz:ajisjr:2484. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Richtmann Publishing Ltd (email available below). General contact details of provider: https://www.richtmann.org/journal/index.php/ajis .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.