Information security policy compliance requires commitment both from organizations and their employees. In practice, employees often need to go above and beyond their normal job responsibilities to meet compliance requirements, and organizations need to provide incentives for compliant behaviors. However, existing research emphasizes mainly on minimizing non-compliant behaviors through fear and sanctions rather than encouragement and support. Drawing on the theory of organizational citizenship behavior (OCB), we bridge this gap by identifying factors that trigger employees’ motives towards security policy compliance. We propose that employees who are satisfied with their jobs, supported by managers, and rewarded for their compliances tend t...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Organizations continually experience losses, financial and otherwise, due to non-compliant behav- io...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
Why do some employees go out of their way to follow prescribed information security protocols, while...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Information security is one of the major challenges for organizations that critically depend on info...
To encourage employees’ information security policy (ISP) compliance behavior, organizations impleme...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Employees’ compliance with information security policies (ISP) plays a key role in ensuring the effe...
In this paper we research the following question: What motivational factors relate, in which degree,...
The Internet and information technology have influenced human life significantly. However, informati...
With regard to the organizational strengthening of information security, in addition to establishing...
Employee noncompliance with Information Systems security policies is a serious computer security thr...
The key threat to information security comes from employees who do not comply with information secur...
The authors found the behavioral factors that influence the organization members’ compliance with th...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Organizations continually experience losses, financial and otherwise, due to non-compliant behav- io...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
Why do some employees go out of their way to follow prescribed information security protocols, while...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Information security is one of the major challenges for organizations that critically depend on info...
To encourage employees’ information security policy (ISP) compliance behavior, organizations impleme...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Employees’ compliance with information security policies (ISP) plays a key role in ensuring the effe...
In this paper we research the following question: What motivational factors relate, in which degree,...
The Internet and information technology have influenced human life significantly. However, informati...
With regard to the organizational strengthening of information security, in addition to establishing...
Employee noncompliance with Information Systems security policies is a serious computer security thr...
The key threat to information security comes from employees who do not comply with information secur...
The authors found the behavioral factors that influence the organization members’ compliance with th...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Organizations continually experience losses, financial and otherwise, due to non-compliant behav- io...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...