The use of sanctions has long been advocated to enforce information security policy (ISP) compliance to control malicious and non-malicious insider threat. The ISP literature is largely based on deterrence theory. However, findings are inconsistent and deterrence has not been a strong predictor especially when non-compliant behavior is the focus of the study. To better explain this phenomenon, scholars have integrated theories and introduced additional constructs. By integrating cognitive dissonance and extended deterrence theory, this study seeks to examine the moderating effect of the personality trait of inertia on the relationship between formal and informal sanctions with ISP non-compliance. More specifically, the focus of this study i...
The paper aims to identify behavioural theories that influence information security policies complia...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Despite the rapid rise in social engineering attacks, not all employees are as compliant with inform...
This study examines the impact of deterrence and inertia on information security policy changes. Cor...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
Employees’ non-compliance with Information Security (IS) policies is an important socio-organization...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
The authors found the behavioral factors that influence the organization members’ compliance with th...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
[[abstract]]Deterrence theory has been widely applied in information security behavioral research. I...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
The paper aims to identify behavioural theories that influence information security policies complia...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Despite the rapid rise in social engineering attacks, not all employees are as compliant with inform...
This study examines the impact of deterrence and inertia on information security policy changes. Cor...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
Employees’ non-compliance with Information Security (IS) policies is an important socio-organization...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
The authors found the behavioral factors that influence the organization members’ compliance with th...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
[[abstract]]Deterrence theory has been widely applied in information security behavioral research. I...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
The paper aims to identify behavioural theories that influence information security policies complia...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Despite the rapid rise in social engineering attacks, not all employees are as compliant with inform...