[[abstract]]Although most behavioral security studies focus on organizational in-role behaviors such as information security policy (ISP) compliance, the role of organizational extra-role behaviors—security behaviors that benefit organizations but are not specified in ISPs—has long been overlooked. This study examines (1) the consequences of organizational in-role and extra-role security behaviors on the effectiveness of ISPs and (2) the role of formal and social controls in enhancing in-role and extra-role security behaviors in organizations. We propose that both in-role security behaviors and extra-role security behaviors contribute to ISP effectiveness. Furthermore, based on social control theory, we hypothesize that social control can b...
Information security in an organization largely depends on employee compliance with information secu...
Recent reports indicate that IS users’ resistance to use information systems security policies is th...
Cyberspace security has been one top issue for a society. The Bright Internet (BI) based on the five...
© 2015 INFORMS.Although most behavioral security studies focus on organizational in-role behaviors s...
The purpose of this study is to explore the effect of formal and social control on in-role and extra...
Although prior information security research predominantly focuses on organizational in-role securit...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Employees are regarded as the weakest link in organizations’ information security management, and th...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Employees’ information security policy (ISP) related behaviors have been paid attention by previous ...
Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in or...
Employees are a major cause of information security vulnerabilities and breaches. Organizations impl...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Recently, there has been increasing interest in studying desirable employee security behaviors, incl...
Part 5: Security Management and Human Aspects of SecurityInternational audienceIndividuals’ complian...
Information security in an organization largely depends on employee compliance with information secu...
Recent reports indicate that IS users’ resistance to use information systems security policies is th...
Cyberspace security has been one top issue for a society. The Bright Internet (BI) based on the five...
© 2015 INFORMS.Although most behavioral security studies focus on organizational in-role behaviors s...
The purpose of this study is to explore the effect of formal and social control on in-role and extra...
Although prior information security research predominantly focuses on organizational in-role securit...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Employees are regarded as the weakest link in organizations’ information security management, and th...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Employees’ information security policy (ISP) related behaviors have been paid attention by previous ...
Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in or...
Employees are a major cause of information security vulnerabilities and breaches. Organizations impl...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Recently, there has been increasing interest in studying desirable employee security behaviors, incl...
Part 5: Security Management and Human Aspects of SecurityInternational audienceIndividuals’ complian...
Information security in an organization largely depends on employee compliance with information secu...
Recent reports indicate that IS users’ resistance to use information systems security policies is th...
Cyberspace security has been one top issue for a society. The Bright Internet (BI) based on the five...