Employees ’ failures to follow information security policy can be costly to organizations. Organizations implement security controls in order to motivate employees. Many control-related motivations have been explored in information security research (e.g., self-efficacy and behavioral control); however, self-determination has yet to receive attention. Self-determination theory is widely used in other fields to explain intrinsically driven performance. This paper examines the effect self-determination—conceptualized as reflective autonomy, and psychological reactance—conceptualized as reactive autonomy have on employees ’ intentions to comply with security policy. Reflective and reactive autonomy offer complementary yet opposite conceptualiz...
Many organizations recognize that their employees, who are often considered the weakest link in info...
[[abstract]]In this research we apply the Theory of Planned Behavior (TPB) to study decisions relate...
The paper aims to identify behavioural theories that influence information security policies complia...
Employees' failures to follow information security policy can be costly to organizations, causing or...
Many existing literatures focus on the effect of external influence mechanism (e.g. fear appeals) th...
The purpose of this paper is to investigate the effect of internal motivators (psychological ownersh...
Information security policy effectiveness relies on how well an individual employee can follow the s...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Employees are regarded as the weakest link in organizations’ information security management, and th...
The authors found the behavioral factors that influence the organization members’ compliance with th...
Drawing upon self-determination theory, this study tested different types of behavioral regulation a...
Currently, information security policy compliance research mainly investigates information security ...
Despite arguments for the benefits of self-management for enhancing employees’ trust and willingness...
Employees are a major cause of information security vulnerabilities and breaches. Organizations impl...
Recent studies raise the concern that the regular communication of security guidelines and policies ...
Many organizations recognize that their employees, who are often considered the weakest link in info...
[[abstract]]In this research we apply the Theory of Planned Behavior (TPB) to study decisions relate...
The paper aims to identify behavioural theories that influence information security policies complia...
Employees' failures to follow information security policy can be costly to organizations, causing or...
Many existing literatures focus on the effect of external influence mechanism (e.g. fear appeals) th...
The purpose of this paper is to investigate the effect of internal motivators (psychological ownersh...
Information security policy effectiveness relies on how well an individual employee can follow the s...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Employees are regarded as the weakest link in organizations’ information security management, and th...
The authors found the behavioral factors that influence the organization members’ compliance with th...
Drawing upon self-determination theory, this study tested different types of behavioral regulation a...
Currently, information security policy compliance research mainly investigates information security ...
Despite arguments for the benefits of self-management for enhancing employees’ trust and willingness...
Employees are a major cause of information security vulnerabilities and breaches. Organizations impl...
Recent studies raise the concern that the regular communication of security guidelines and policies ...
Many organizations recognize that their employees, who are often considered the weakest link in info...
[[abstract]]In this research we apply the Theory of Planned Behavior (TPB) to study decisions relate...
The paper aims to identify behavioural theories that influence information security policies complia...