Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ijinfomgt.2018.10.017
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Aladwani, Adel M. & Dwivedi, Yogesh K., 2018. "Towards a theory of SocioCitizenry: Quality anticipation, trust configuration, and approved adaptation of governmental social media," International Journal of Information Management, Elsevier, vol. 43(C), pages 261-272.
- Shiau, Wen-Lung & Dwivedi, Yogesh K. & Lai, He-Hong, 2018. "Examining the core knowledge on facebook," International Journal of Information Management, Elsevier, vol. 43(C), pages 52-63.
- Ahmad, Atif & Maynard, Sean B & Shanks, Graeme, 2015. "A case analysis of information systems and security incident responses," International Journal of Information Management, Elsevier, vol. 35(6), pages 717-723.
- Kawaljeet Kaur Kapoor & Kuttimani Tamilmani & Nripendra P. Rana & Pushp Patil & Yogesh K. Dwivedi & Sridhar Nerur, 2018. "Advances in Social Media Research: Past, Present and Future," Information Systems Frontiers, Springer, vol. 20(3), pages 531-558, June.
- Moon, Yun Ji & Choi, Myeonggil & Armstrong, Deborah J., 2018. "The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations," International Journal of Information Management, Elsevier, vol. 40(C), pages 54-66.
- Khansa, Lara & Liginlal, Divakaran, 2012. "Whither information security? Examining the complementarities and substitutive effects among IT and information security firms," International Journal of Information Management, Elsevier, vol. 32(3), pages 271-281.
- Soomro, Zahoor Ahmed & Shah, Mahmood Hussain & Ahmed, Javed, 2016. "Information security management needs more holistic approach: A literature review," International Journal of Information Management, Elsevier, vol. 36(2), pages 215-225.
- Shiau, Wen-Lung & Dwivedi, Yogesh K. & Yang, Han Suan, 2017. "Co-citation and cluster analyses of extant literature on social networks," International Journal of Information Management, Elsevier, vol. 37(5), pages 390-399.
- John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Berger, Allen N. & Öztekin, Özde & Roman, Raluca A., 2023. "Geographic deregulation and bank capital structure," Journal of Banking & Finance, Elsevier, vol. 149(C).
- Naume Sonhera & David Mhlanga, 2022. "Reducing Cyber Incidents through Good Online Behavioral Norms: Lessons from South Africa," Eurasian Journal of Social Sciences, Eurasian Publications, vol. 10(1), pages 37-48.
- Han, Kookyoung & Choi, Jin Hyuk, 2023. "Implications of false alarms in dynamic games on cyber-security," Chaos, Solitons & Fractals, Elsevier, vol. 169(C).
- Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
- Hameed, Irfan & Akram, Umair & Khan, Yamna & Khan, Naveed R. & Hameed, Imran, 2024. "Exploring consumer mobile payment innovations: An investigation into the relationship between coping theory factors, individual motivations, social influence and word of mouth," Journal of Retailing and Consumer Services, Elsevier, vol. 77(C).
- Wing Fung Chong & Runhuan Feng & Hins Hu & Linfeng Zhang, 2022. "Cyber Risk Assessment for Capital Management," Papers 2205.08435, arXiv.org, revised Oct 2023.
- Kim, Byung-Jik & Kim, Min-Jik, 2024. "The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT," Technology in Society, Elsevier, vol. 77(C).
- Tahereh Hasani & Norman O’Reilly & Ali Dehghantanha & Davar Rezania & Nadège Levallet, 2023. "Evaluating the adoption of cybersecurity and its influence on organizational performance," SN Business & Economics, Springer, vol. 3(5), pages 1-38, May.
- Canitgia Tambariki, 2024. "Drivers of banking consumers' cybersecurity behavior: Applying the extended protection motivation theory ," GATR Journals jmmr327, Global Academy of Training and Research (GATR) Enterprise.
- Ahu Ergen & Ahmet Naci Ünal & Mehmet Sıtkı Saygili, 2021. "Is It Possible to Change the Cyber Security Behaviours of Employees? Barriers and Promoters," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 10, July.
- Percia David, Dimitri & Maréchal, Loïc & Lacube, William & Gillard, Sébastien & Tsesmelis, Michael & Maillart, Thomas & Mermoud, Alain, 2023. "Measuring security development in information technologies: A scientometric framework using arXiv e-prints," Technological Forecasting and Social Change, Elsevier, vol. 188(C).
- Ou, Carol & Zhang, Xiaowei & Angelopoulos, Spyros & Davison, Robert & Janse, Noury, 2022. "Security breaches and organization response strategy : Exploring consumers’ threat and coping appraisals," Other publications TiSEM 9ac0c2eb-87e8-4c1d-a0b0-c, Tilburg University, School of Economics and Management.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Taneja, Anu & Arora, Anuja, 2019. "Modeling user preferences using neural networks and tensor factorization model," International Journal of Information Management, Elsevier, vol. 45(C), pages 132-148.
- Lu, Chih-Cheng & Wu, Ing-Long & Hsiao, Wei-Hung, 2019. "Developing customer product loyalty through mobile advertising: Affective and cognitive perspectives," International Journal of Information Management, Elsevier, vol. 47(C), pages 101-111.
- Agarwal, Shweta & Kumar, Shailendra & Goel, Utkarsh, 2019. "Stock market response to information diffusion through internet sources: A literature review," International Journal of Information Management, Elsevier, vol. 45(C), pages 118-131.
- Shi, Si & Cao, Yu & Chen, Yang & Chow, Wing S., 2019. "How social media brand pages contribute to functional conflict: The central role of commitment," International Journal of Information Management, Elsevier, vol. 45(C), pages 95-106.
- Saito, Taiga & Takahashi, Akihiko & Koide, Noriaki & Ichifuji, Yu, 2019. "Application of online booking data to hotel revenue management," International Journal of Information Management, Elsevier, vol. 46(C), pages 37-53.
- Cao, Xiongfei & Yu, Lingling, 2019. "Exploring the influence of excessive social media use at work: A three-dimension usage perspective," International Journal of Information Management, Elsevier, vol. 46(C), pages 83-92.
- Wang, Xuequn & Lin, Xiaolin & Spencer, Marilyn K., 2019. "Exploring the effects of extrinsic motivation on consumer behaviors in social commerce: Revealing consumers’ perceptions of social commerce benefits," International Journal of Information Management, Elsevier, vol. 45(C), pages 163-175.
- Azaizah, Nadeem & Reychav, Iris & Raban, Daphne R. & Simon, Tomer & McHaney, Roger, 2018. "Impact of ESN implementation on communication and knowledge-sharing in a multi-national organization," International Journal of Information Management, Elsevier, vol. 43(C), pages 284-294.
- Hassan, Lobna & Dias, Antonio & Hamari, Juho, 2019. "How motivational feedback increases user’s benefits and continued use: A study on gamification, quantified-self and social networking," International Journal of Information Management, Elsevier, vol. 46(C), pages 151-162.
- Cheng, Xusen & Gu, Yu & Shen, Jia, 2019. "An integrated view of particularized trust in social commerce: An empirical investigation," International Journal of Information Management, Elsevier, vol. 45(C), pages 1-12.
- Shao, Zhen & Pan, Zhengyuan, 2019. "Building Guanxi network in the mobile social platform: A social capital perspective," International Journal of Information Management, Elsevier, vol. 44(C), pages 109-120.
- Baillette, Paméla & Barlette, Yves & Leclercq-Vandelannoitte, Aurélie, 2018.
"Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users,"
International Journal of Information Management, Elsevier, vol. 43(C), pages 76-84.
- Paméla Baillette & Yves Barlette & Aurélie Leclercq-Vandelannoitte, 2018. "Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users," Post-Print hal-01914791, HAL.
- Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
- Schomakers, Eva-Maria & Lidynia, Chantal & Müllmann, Dirk & Ziefle, Martina, 2019. "Internet users’ perceptions of information sensitivity – insights from Germany," International Journal of Information Management, Elsevier, vol. 46(C), pages 142-150.
- Meng Wang & Yalin Qin & Jiaojiao Liu & Weidong Li, 2023. "Identifying personal physiological data risks to the Internet of Everything: the case of facial data breach risks," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-15, December.
- Son, Jaebong & Lee, Hyung Koo & Jin, Sung & Lee, Jintae, 2019. "Content features of tweets for effective communication during disasters: A media synchronicity theory perspective," International Journal of Information Management, Elsevier, vol. 45(C), pages 56-68.
- Shiau, Wen-Lung & Dwivedi, Yogesh K. & Lai, He-Hong, 2018. "Examining the core knowledge on facebook," International Journal of Information Management, Elsevier, vol. 43(C), pages 52-63.
- Wang, Yichuan & Herrando, Carolina, 2019. "Does privacy assurance on social commerce sites matter to millennials?," International Journal of Information Management, Elsevier, vol. 44(C), pages 164-177.
- Irina Wedel & Michael Palk & Stefan Voß, 2022. "A Bilingual Comparison of Sentiment and Topics for a Product Event on Twitter," Information Systems Frontiers, Springer, vol. 24(5), pages 1635-1646, October.
- Naveena Prakasam & Louisa Huxtable-Thomas, 2021. "Reddit: Affordances as an Enabler for Shifting Loyalties," Information Systems Frontiers, Springer, vol. 23(3), pages 723-751, June.
More about this item
Keywords
Information security; Peer behavior; Cues to action; Protection motivation theory; Cybersecurity policy compliance;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ininma:v:45:y:2019:i:c:p:13-24. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-information-management .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.