Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model

Published: 01 September 2021 Publication History

Abstract

A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unable to address the threat and, feeling overwhelmed, focus only on controlling their emotions, merely making themselves feel better. Based on our findings, organizations can enhance their security by understanding the “tipping point” where employees’ focus likely changes from problem-solving to emotion appeasement, and instead push them into a more constructive direction.Yan Chen is an associate professor at Florida International University. She received her PhD in management information systems from University of Wisconsin–Milwaukee. Her research focuses on information security management, online fraud, privacy, and social media. She has published more than 30 research papers in refereed academic journals and conference proceedings.Dennis F. Galletta is a LEO awardee, fellow, and former president of the Association for Information Systems and professor at University of Pittsburgh since 1985. He has published 108 articles and four books. He is a senior editor at MIS Quarterly and an editorial board member at the Journal of Management Information Systems, and has been on several other boards.Paul Benjamin Lowry is the Suzanne Parker Thornhill Chair Professor in Business Information Technology at the Pamplin College of Business at Virginia Tech. He has published more than 135 journal articles. His research areas include organizational and behavioral security and privacy; online deviance and harassment, and computer ethics; human–computer interaction, social media, and gamification; and decision sciences, innovation, and supply chains.Xin (Robert) Luo is Endowed Regent’s Professor and full professor of MIS at the University of New Mexico. His research has appeared in leading information systems journals, and he serves as an associate editor for the Journal of the Association for Information Systems, Decision Sciences Journal, Information & Management, Electronic Commerce Research, and the Journal of Electronic Commerce Research.Gregory D. Moody is currently Lee Professor of Information Systems at the University of Nevada Las Vegas, and director of the cybersecurity graduate program. His interests include information systems security and privacy, e-business, and human–computer interaction. He is currently a senior editor for the Information Systems Journal and Transactions on Human-Computer Interaction.Robert Willison is a professor of management at Xi’an Jiaotong–Liverpool University. He received his PhD in information systems from the London School of Economics. His research focuses on insider computer abuse, information security policy compliance/noncompliance, software piracy, and cyber-loafing. His research has appeared in refereed academic journals such as MIS Quarterly, Journal of the Association for Information Systems, Information Systems Journal, and others.

Abstract

Organizational information security (ISec) threats have exploded with advances in globalization and technology. Thus, organizations are scrambling to find both technical and behavioral approaches to shore up security. Whereas security technologies are crucial to these efforts, they are often rendered useless by employees’ misunderstanding, carelessness, or deliberate disregard of ISec polices (ISPs). Accordingly, organizations are increasingly seeking ways to encourage employees to work as security allies. A key approach in many organizations is encouraging employees to better understand and comply with ISPs. Consequently, ISec research has leveraged several theories to identify the underlying reasons for ISP compliance behaviors among employees. However, most of this research focuses unilaterally on compliance without simultaneously considering noncompliance, as if noncompliance were caused by opposite factors. A pressing need thus exists for a theoretical foundation that can consider both common outcomes and whether there is an explainable tipping point that can explain when a normally compliant employee chooses to become noncompliant, and vice versa. In this study, we contextualize the extended parallel process model (EPPM) to ISP compliance by accounting for dual outcomes of compliance/noncompliance and dual roles of coping—problem-focused coping and emotion-focused coping. We further extend the EPPM to include response costs and maladaptive rewards to predict the two possible outcomes. Additionally, we employ a weighted discriminant value measurement approach to examine the tipping point between compliance and noncompliance. To test our resulting theoretical model and new measure, we conducted two separate empirical studies with 816 employees, using survey and scenario methodologies. The empirical results from these studies indicate that our contextualization and extension of EPPM better explain the gaps than alternative theories in the ISP literature.

References

[1]
Awad NF, Ragowsky A (2008) Establishing trust in electronic commerce through online word of mouth: An examination across genders. J. Management Inform. Systems 24(4):101–121.
[2]
Banas J (2008) A tailored approach to identifying and addressing college students’ online health information literacy. Amer. J. Health Ed. 39(4):228–236.
[3]
Belsley DA, Kuh E, Welsch RE (2005) Regression Diagnostics: Identifying Influential Data and Sources of Collinearity (Wiley, Hoboken, NJ).
[4]
Bennett RJ, Robinson SL (2000) Development of a measure of workplace deviance. J. Appl. Psych. 85(3):349–360.
[5]
Bollen K, Lennox R (1991) Conventional wisdom on measurement: A structural equation perspective. Psych. Bull. 110(2):305–314.
[6]
Boss SR, Galletta DF, Moody GD, Lowry PB, Polak P (2015) What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users. MIS Quart. 39(4):837–864.
[7]
Boss SR, Kirsch LJ, Angermeier I, Shingler RA, Boss RW (2009) If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. Eur. J. Inform. Systems 18(2):151–164.
[8]
Bulgurcu B, Cavusoglu H, Benbasat I (2010) Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quart. 34(3):523–548.
[9]
Burns A, Roberts T, Posey C, Lowry PB (2019) The adaptive roles of positive and negative emotions in organizational insiders’ engagement in security-based precaution taking. Inform. Systems Res. 30(4):1228–1247.
[10]
Chen Y, Zahedi FM (2016) Individuals’ internet security perceptions and behaviors: Polycontextual contrasts between the United States and China. MIS Quart. 40(1):205–222.
[11]
Chew F, Palmer S, Slonska Z, Subbiah K (2002) Enhancing health knowledge, health beliefs, and health behavior in Poland through a health promoting television program series. J. Health Comm. 7(3):179–196.
[12]
Cram WA, Proudfoot JG, D’Arcy J (2017) Organizational information security policies: A review and research framework. Eur. J. Inform. Systems 26(6):605–641.
[13]
Cyr D (2008) Modeling website design across cultures: Relationships to trust, satisfaction, and e-loyalty. J. Management Inform. Systems 24(4):47–72.
[14]
D’Arcy J, Greene G (2014) Security culture and the employment relationship as drivers of employees’ security compliance. Inform. Management Comput. Security 22(5):474–489.
[15]
D’Arcy J, Lowry PB (2019) Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal study. Inform. Systems J. 29(1):43–69.
[16]
D’Arcy J, Herath T, Shoss MK (2014) Understanding employee responses to stressful information security requirements: A coping perspective. J. Management Inform. Systems 31(2):285–318.
[17]
D’Arcy J, Hovav A, Galletta DF (2009) User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Inform. Systems Res. 20(1):79–98.
[18]
Davison RM, Martinsons MG (2016) Context is king! Considering particularism in research design and reporting. J. Inform. Tech. 31(3):241–249.
[19]
de Hoog N, Stroebe W, de Wit JBF (2007) The impact of vulnerability to and severity of a health risk on processing and acceptance of fear-arousing communications: A meta-analysis. Rev. General Psych. 11(3):258–285.
[20]
Floyd DL, Prentice-Dunn S, Rogers RW (2000) A meta-analysis of research on protection motivation theory. J. Appl. Soc. Psych. 30(2):407–429.
[21]
Fry RB, Prentice-Dunn S (2005) The effects of coping information and value affirmation on responses to a perceived health threat. Health Comm. 17(2):133–147.
[22]
Fry RB, Prentice-Dunn S (2006) Effects of a psychosocial intervention on breast self-examination attitudes and behaviors. Health Ed. Res. 21(2):287–295.
[23]
Gefen D, Straub DW, Rigdon EE (2011) An update and extension to SEM guidelines for administrative and social science research. MIS Quart. 35(2):iii–xiv.
[24]
Gibney R, Zagenczyk TJ, Masters MF (2009) The negative aspects of social exchange: An introduction to perceived organizational obstruction. Group Organ. Management 34(6):665–697.
[25]
Goo J, Yim M-S, Kim DJ (2014) A path to successful management of employee security compliance: An empirical study of information security climate. IEEE Trans. Professional Comm. 57(4):286–308.
[26]
Goodhue DL, Lewis W, Thompson R (2012) Does PLS have advantages for small sample size or non-normal data? MIS Quart. 36(3):981–1001.
[27]
Gore TD, Bracken CC (2005) Testing the theoretical design of a health risk message: Reexamining the major tenets of the extended parallel process model. Health Ed. Behav. 32(1):27–41.
[28]
Grewal R, Cote JA, Baumgartner H (2004) Multicollinearity and measurement error in structural equation models: Implications for theory testing. Marketing Sci. 23(4):519–529.
[29]
Guo KH, Yuan Y, Archer NP, Connelly CE (2011) Understanding nonmalicious security violations in the workplace: A composite behavior model. J. Management Inform. Systems 28(2):203–236.
[30]
Gurung A, Luo X, Liao Q (2009) Consumer motivations in taking action against spyware: An empirical investigation. Inform. Management Comput. Security 17(3):276–289.
[31]
Hair JF, Ringle CM, Sarstedt M (2011) PLS-SEM: Indeed a silver bullet. J. Marketing Theory Practice 19(2):139–152.
[32]
Hair JF Jr, Black WC, Babin BJ, Anderson RE (2006) Multivariate Data Analysis, 7th ed. (Prentice Hall, New York).
[33]
Han J, Kim YJ, Kim H (2017) An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. Comput. Security 66:52–65.
[34]
Hayes AF (2009) Beyond Baron and Kenny: Statistical mediation analysis in the new millennium. Comm. Monographs 76(4):408–420.
[35]
Hedström K, Karlsson F, Kolkowska E (2013) Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Inform. Management Comput. Security 21(4):266–287.
[36]
Hedström K, Kolkowska E, Karlsson F, Allen JP (2011) Value conflicts for information security management. J. Strategic Inform. Systems 20(4):373–384.
[37]
Henseler J, Chin WW (2010) A comparison of approaches for the analysis of interaction effects between latent variables using partial least squares path modeling. Structural Equation Model. 17(1):82–109.
[38]
Herath T, Rao HR (2009) Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inform. Systems 18(2):106–125.
[39]
Hong W, Chan FK, Thong JY, Chasalow LC, Dhillon G (2013) A framework and guidelines for context-specific theorizing in information systems research. Inform. Systems Res. 25(1):111–136.
[40]
Hooper D, Coughlan J, Mullen MR (2008) Structural equation modelling: Guidelines for determining model fit. Electronic J. Bus. Res. Methods 6(1):53–60.
[41]
Hu Q, Xu Z, Dinev T, Ling H (2011) Does deterrence work in reducing information security policy abuse by employees? Comm. ACM 54(6):54–60.
[42]
Ifinedo P (2012) Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Comput. Security 31(1):83–95.
[43]
Jain RP, Simon JC, Poston RS (2011) Mitigating vendor silence in offshore outsourcing: An empirical investigation. J. Management Inform. Systems 27(4):261–298.
[44]
Jenkins JL, Grimes M, Proudfoot J, Lowry PB (2014) Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time warnings. Inform. Technology Development 20(2):196–213.
[45]
Johnston AC, Warkentin M (2010a) Fear appeals and information security behaviors: An empirical study. MIS Quart. 34(1):549–566.
[46]
Johnston AC, Warkentin M (2010b) The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions. J. Organ. End User Comput. 22(3):1–21.
[47]
Johnston AC, Warkentin M, Siponen M (2015) An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quart. 39(1):113–134.
[48]
Johnston AC, Warkentin M, Dennis AR, Siponen M (2019) Speak their language: Designing effective messages to improve employees’ information security decision making. Decision Sci. 50(2):245–284.
[49]
Johnston AC, Warkentin M, McBride M, Carter L (2016) Dispositional and situational factors: influences on information security policy violations. Eur. J. Inform. Systems 25(3):231–251.
[50]
Kahoe RD, Dunn RF (1976) The fear of death and religious attitudes and behavior. J. Sci. Study Religion 14(4):379–382.
[51]
Karjalainen M, Sarker S, Siponen M (2019) Toward a theory of information systems security behaviors of organizational employees: A dialectical process perspective. Inform. Systems Res. 30(2):687–704.
[52]
Karjalainen M, Siponen M, Puhakainen P, Sarker S (2020) Universal and culture-dependent employee compliance of information systems security procedures. J. Global Inform. Tech. Manag. 23(1):5–24.
[53]
Karlsson F, Karlsson M, Åström J (2017) Measuring employees’ compliance–the importance of value pluralism. Inform. Comput. Sec. 25(3):279–299.
[54]
Kim DJ (2008) Self-perception-based vs. transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. J. Management Inform. Systems 24(4):13–45.
[55]
Kim JJ, Park EHE, Baskerville RL (2016) A model of emotion and computer abuse. Inform. Management 53(1):91–108.
[56]
Kirlappos I, Beautement A, Sasse MA (2013) 'Comply or die' is dead: Long live security-aware principal agents. Adam AA, Brenner M, Smith M, eds. Financial Cryptography and Data Security (Springer, Berlin), 70–82.
[57]
Kolkowska E, Dhillon G (2013) Organizational power and information security rule compliance. Comput. Security 33:3–11.
[58]
Kolkowska E, Karlsson F, Hedström K (2017) Toward analysing the rationale of information security non-compliance: Devising a value-based compliance analysis method. J. Strategic Inform. Systems 26(1):39–57.
[59]
LaTour MS, Rotfeld HJ (1997) There are threats and (maybe) fear-caused arousal: Theory and confusions of appeals to fear and fear arousal itself. J. Advertising 26(3):45–59.
[60]
Lazarus R (1993) Coping theory and research: Past, present, and future. Psychosomatic Medicine 55(3):234–247.
[61]
Leventhal H (1970) Findings and theory in the study of fear communications. Adv. Experiment. Soc. Psych. 5:119–186.
[62]
Li H, Luo RX, Chen Y (2021) Understanding information security policy violation from a situational action perspective. J. Assoc. Inform. Systems. Forthcoming.
[63]
Li H, Zhang J, Sarathy R (2010) Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems 48(4):635–645.
[64]
Li H, Sarathy R, Zhang J, Luo X (2014) Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Inform. Systems J. 24(6):479–502.
[65]
Liang H, Xue Y (2010) Understanding security behaviors in personal computer usage: A threat avoidance perspective. J. Assoc. Inform. Systems 11(7):394–413.
[66]
Liang H, Xue Y, Pinsonneault A, Wu Y (2019) What users do besides problem-focused coping when facing IT security threats: An emotion-focused coping perspective. MIS Quart. 43(2):373–394.
[67]
Liao Q, Gurung A, Luo X, Li L (2009) Workplace management and employee misuse: Does punishment matter? J. Comput. Inform. Systems 50(2):49–59.
[68]
Lowry PB, Moody GD (2015) Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organizational information security policies. Inform. Systems. J. 25(5):433–463.
[69]
Lowry PB, Cao J, Everard A (2011) Privacy concerns vs. desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. J. Management Inform. Systems 27(4):163–200.
[70]
Lowry PB, Dinev T, Willison R (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. Eur. J. Inform. Systems 26(6):546–563.
[71]
Lowry PB, D’Arcy J, Hammer B, Moody GD (2016a) ‘Cargo Cult’ science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. J. Strategic Inform. Systems 25(3):232–240.
[72]
Lowry PB, Posey C, Bennett RJ, Roberts TL (2015) Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust. Inform. Systems J. 25(3):193–230.
[73]
Lowry PB, Zhang J, Wang C, Siponen M (2016b) Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model. Inform. Systems Res. 27(4):962–986.
[74]
MacKinnon DP (2008) Introduction to Statistical Mediation Analysis (Erlbaum, New York).
[75]
Maddux JE, Rogers RW (1983) Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. J. Experiment. Soc. Psych. 19(5):469–479.
[76]
Marsh HW, Hocevar D (1985) Application of confirmatory factor analysis to the study of self-concept: First- and higher order factors models and their invariance across groups. Psych. Bull. 97(3):562–582.
[77]
McIntosh DN, Zajonc RB, Vig PS, Emerick SW (1997) Facial movement, breathing, temperature, and affect: Implications of the vascular theory of emotional efference. Cognition Emotion 11(2):171–195.
[78]
Mears DP, Stewart EA (2010) Interracial contact and fear of crime. J. Criminal Justice Popular Culture 38(1):34–41.
[79]
Mendes M, McDonald MD (2001) Putting severity of punishment back in the deterrence package. Policy Stud. J. 29(4):588–610.
[80]
Milne S, Sheeran P, Orbell S (2000) Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. J. Appl. Soc. Psych. 30(1):106–143.
[81]
Osman A, Barrious FX, Osman JR, Schneekloth R, Troutman JA (1994) The pain anxiety symptoms scale: Psychometric properties in a community sample. J. Behav. Medicine 17(5):511–522.
[82]
Plutchik R (2001) The nature of emotions. Amer. Sci. 89(4):344–350.
[83]
Podsakoff PM, MacKenzie SB, Lee JY, Podsakoff NP (2003) Common method biases in behavioral research: A critical review of the literature and recommended remedies. J. Appl. Psych. 88(5):879–903.
[84]
Ponemon (2019) 2019 Ponemon Institute study on the cyber resilient organization. TechRepublic, https://www.techrepublic.com/resource-library/whitepapers/2019-ponemon-institute-study-on-the-cyber-resilient-organization/.
[85]
Popova L (2012) The extended parallel process model illuminating the gaps in research. Health Ed. Behav. 39(4):455–473.
[86]
Posey C, Bennett RJ, Roberts TL (2011a) Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes. Comput. Security 30(6–7):486–497.
[87]
Posey C, Roberts TL, Lowry PB (2011b) Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations. Dewald Roode Workshop Inform. Systems Security Res., Blacksburg, VA, September 23–24, 1–51.
[88]
Posey C, Roberts TL, Lowry PB (2015) The impact of organizational commitment on insiders’ motivation to protect organizational information assets. J. Management Inform. Systems 32(4):179–214.
[89]
Posey C, Bennett B, Roberts T, Lowry PB (2011c) When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. J. Inform. System Security 7(1):24–47.
[90]
Posey C, Lowry PB, Roberts TL, Ellis S (2010) Proposing the online community self-disclosure model: The case of working professionals in France and the UK who use online communities. Eur. J. Inform. Systems 19(2):181–195.
[91]
Posey C, Roberts TL, Lowry PB, Hightower RT (2014) Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Inform. Management 51(5):551–567.
[92]
Posey C, Roberts TL, Lowry PB, Bennett RJ, Courtney J (2013) Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quart. 37(4):1189–1210.
[93]
Puhakainen P, Siponen M (2010) Improving employees’ compliance through information systems security training: An action research study. MIS Quart. 34(4):757–778.
[94]
Rao MT, Brown CV, Perkins WC (2007) Host country resource availability and information system control mechanisms in multinational corporations: An empirical test of resource dependence theory. J. Manage. Inf. Syst. 23(4):11–28.
[95]
Rogers RW (1983) Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Cacioppo JT, Petty RE, eds. Social Psychophysiology: A Sourcebook (Guilford, New York), 153–176.
[96]
Scherer KR (2005) What are emotions? And how can they be measured? Soc. Sci. Inform. 44(4):695–729.
[97]
Schuetz SW, Benjamin Lowry P, Pienta DA, Bennett Thatcher J (2020) The effectiveness of abstract vs. concrete fear appeals in information security. J. Management Inform. Systems 37(3):723–757.
[98]
Silic M, Lowry PB (2020) Using design-science based gamification to improve organizational security training and compliance. J. Management Inform. Systems 37(1):129–161.
[99]
Siponen M, Vance A (2010) Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quart. 34(3):487–502.
[100]
Son J-Y, Park J (2016) Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns. Internat. J. Inform. Management 36(3):309–321.
[101]
Vance A, Elie-Dit-Cosaque C, Straub DW (2008) Examining trust in information technology artifacts: The effects of system quality and culture. J. Management Inform. Systems 24(4):73–100.
[102]
Vance A, Lowry PB, Eggett D (2015) Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Quart. 39(2):345–366.
[103]
Vance A, Siponen M, Pahnila S (2012) Motivating IS security compliance: Insights from habit and protection motivation theory. Inform. Management 49(3-4):190–198.
[104]
Wang J, Li Y, Rao HR (2017) Coping responses in phishing detection: An investigation of antecedents and consequences. Inform. Systems. Res. 28(2):378–396.
[105]
Warkentin M, Johnston A, Walden E, Straub D (2016) Neural correlates of protection motivation for secure IT behaviors: An fMRI examination. J. Assoc. Inform. Systems 17(3):194–215.
[106]
Willison R, Lowry PB, Paternoster R (2018) A tale of two deterrents: Considering the role of absolute and restrictive deterrence in inspiring new directions in behavioral and organizational security. J. Assoc. Inform. Systems. 19(12):1187–1216.
[107]
Wink P (2006) Who is afraid of death? Religiousness, spirituality, and death anxiety in late adulthood. J. Religion Spirituality Aging 18(2):93–110.
[108]
Witte K (1992) Putting the fear back into fear appeals: The extended parallel process model. Comm. Monographs 59(4):329–349.
[109]
Witte K (1994) Fear control and danger control: A test of the extended parallel process model (EPPM). Comm. Monographs 61(2):113–134.
[110]
Witte K, Allen M (2000) A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Ed. Behav. 27(5):591–615.
[111]
Witte K, Cameron A, McKeon JK, Berkowitz JM (1996) Predicting risk behaviors: Development and validation of a diagnostic scale. J. Health Comm. 1(4):317–342.
[112]
Xu F, Luo XR, Hsu C (2020) Anger or fear? Effects of discrete emotions on employee’s computer-related deviant behavior. Inform. Management 57(3):103180.
[113]
Yazdanmehr A, Wang J (2016) Employees’ information security policy compliance: A norm activation perspective. Decision Support Systems 92:36–46.
[114]
Zeidner M, Endler NS (1995) Handbook of Coping: Theory, Research, Applications (Wiley, New York).
[115]
Zhang D, Lowry PB, Zhou L, Fu X (2007) The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence. J. Management Inform. Systems 23(4):53–80.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Information Systems Research
Information Systems Research  Volume 32, Issue 3
September 2021
430 pages
ISSN:1526-5536
DOI:10.1287/isre.2021.32.issue-3
Issue’s Table of Contents

Publisher

INFORMS

Linthicum, MD, United States

Publication History

Published: 01 September 2021
Accepted: 14 February 2021
Received: 19 December 2018

Author Tags

  1. information security
  2. extended parallel processing model
  3. protection motivation theory
  4. organizational security

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Exploring the factors influencing information security policy compliance and violationsComputers and Security10.1016/j.cose.2024.104062147:COnline publication date: 7-Jan-2025
  • (2024)Ontology-Based Intelligent Interface Personalization for Protection Against Phishing AttacksInformation Systems Research10.1287/isre.2021.006535:3(1463-1478)Online publication date: 1-Sep-2024
  • (2024)Investigation of information security policy violations among oil and gas employeesJournal of Information Science10.1177/0165551522108768050:1(254-272)Online publication date: 1-Feb-2024
  • (2024)Exploring eustress and fearComputers and Security10.1016/j.cose.2024.103857142:COnline publication date: 1-Jul-2024
  • (2024)Testing the dominant mediator in EPPMComputers and Security10.1016/j.cose.2024.103776140:COnline publication date: 1-May-2024
  • (2024)Is the internet a double-edged sword for organizations? An empirical study on cyberloafingInformation Technology and Management10.1007/s10799-022-00385-525:4(319-333)Online publication date: 1-Dec-2024

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media