Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insignificant. Based on these findings, the authors disc...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
The use of sanctions has long been advocated to enforce information security policy (ISP) compliance...
Internet security risks are becoming the leading security threats confronting today’s organizations ...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
To encourage employees’ information security policy (ISP) compliance behavior, organizations impleme...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
Internet security risks are becoming the leading security threats confronting today’s organizations ...
Information security policies as apparatus for communicating security principles with employees are ...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Extant research has shown that neutralization processes can enable potential IS security policy viol...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
The use of sanctions has long been advocated to enforce information security policy (ISP) compliance...
Internet security risks are becoming the leading security threats confronting today’s organizations ...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
To encourage employees’ information security policy (ISP) compliance behavior, organizations impleme...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
Internet security risks are becoming the leading security threats confronting today’s organizations ...
Information security policies as apparatus for communicating security principles with employees are ...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Extant research has shown that neutralization processes can enable potential IS security policy viol...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
The use of sanctions has long been advocated to enforce information security policy (ISP) compliance...
Internet security risks are becoming the leading security threats confronting today’s organizations ...