Incidents of computer abuse, proprietary information leaks and other security lapses have been on an increase. Most often, such security lapses are attributed to internal employees in organizations subverting established organizational information security policy (ISP). As employee compliance with ISP is the key to escalating information security breaches, understanding employee motivation for following ISP is critical. Using the Thomas and Velthouse’s (1990) intrinsic motivation model, we investigate the role of intrinsic motivation for ISP compliance. Through survey data collected from 289 participants, the study demonstrates that the psychological empowerment has a positive impact on participants’ ISP compliance intention. Furthermore, t...
Information security policy effectiveness relies on how well an individual employee can follow the s...
Most recent information security incidents have been caused by employees’ poor managements rather th...
It is widely agreed that a key threat to information security is caused by careless employees who do...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
In this paper we research the following question: What motivational factors relate, in which degree,...
Noncompliance by employees with Information Systems security policies is a serious computer security...
Purpose – Employee compliance with information system security policies (ISSPs) has been emphasized ...
Information security is one of the major challenges for organizations that critically depend on info...
Employee noncompliance with Information Systems security policies is a serious computer security thr...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Many existing literatures focus on the effect of external influence mechanism (e.g. fear appeals) th...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Despite the rapid rise in social engineering attacks, not all employees are as compliant with inform...
This study aims to explore information security policy (ISP) compliance intention through psychologi...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
Information security policy effectiveness relies on how well an individual employee can follow the s...
Most recent information security incidents have been caused by employees’ poor managements rather th...
It is widely agreed that a key threat to information security is caused by careless employees who do...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
In this paper we research the following question: What motivational factors relate, in which degree,...
Noncompliance by employees with Information Systems security policies is a serious computer security...
Purpose – Employee compliance with information system security policies (ISSPs) has been emphasized ...
Information security is one of the major challenges for organizations that critically depend on info...
Employee noncompliance with Information Systems security policies is a serious computer security thr...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Many existing literatures focus on the effect of external influence mechanism (e.g. fear appeals) th...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Despite the rapid rise in social engineering attacks, not all employees are as compliant with inform...
This study aims to explore information security policy (ISP) compliance intention through psychologi...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
Information security policy effectiveness relies on how well an individual employee can follow the s...
Most recent information security incidents have been caused by employees’ poor managements rather th...
It is widely agreed that a key threat to information security is caused by careless employees who do...