Cyberspace security has been one top issue for a society. The Bright Internet (BI) based on the five principles offers a viable solution. The adoption of BI is important to the implementation of BI. A majority of the previous studies have mainly focused on access-policy violations and compliance in the past decades, while the extra-role behaviors have obtained insufficient attentions. Based on the theories of social control and accountability, this study examines the impacts of extra-role behaviors on BI policy adoption. The research findings have implications for future research and practice
Internet security risks, the leading security threats confronting today’s organizations, often resul...
Information security policy compliance (ISP) is one of the key concerns that face organizations toda...
Internet security risks are becoming the leading security threats confronting today’s organizations ...
Cyberspace security has been one top issue for a society. The Bright Internet (BI) based on the five...
[[abstract]]Although most behavioral security studies focus on organizational in-role behaviors such...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
The purpose of this study is to explore the effect of formal and social control on in-role and extra...
Although prior information security research predominantly focuses on organizational in-role securit...
Internet usage has become a norm in most organizations where organizations have started monitoring e...
Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in or...
Information security in an organization largely depends on employee compliance with information secu...
Cyber-world is a typical form of social syndication. Although the future of cyber-world seems bright...
Internet security risks are becoming the leading security threats confronting today’s organizations ...
The Internet and information technology have influenced human life significantly. However, informati...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Internet security risks, the leading security threats confronting today’s organizations, often resul...
Information security policy compliance (ISP) is one of the key concerns that face organizations toda...
Internet security risks are becoming the leading security threats confronting today’s organizations ...
Cyberspace security has been one top issue for a society. The Bright Internet (BI) based on the five...
[[abstract]]Although most behavioral security studies focus on organizational in-role behaviors such...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
The purpose of this study is to explore the effect of formal and social control on in-role and extra...
Although prior information security research predominantly focuses on organizational in-role securit...
Internet usage has become a norm in most organizations where organizations have started monitoring e...
Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in or...
Information security in an organization largely depends on employee compliance with information secu...
Cyber-world is a typical form of social syndication. Although the future of cyber-world seems bright...
Internet security risks are becoming the leading security threats confronting today’s organizations ...
The Internet and information technology have influenced human life significantly. However, informati...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Internet security risks, the leading security threats confronting today’s organizations, often resul...
Information security policy compliance (ISP) is one of the key concerns that face organizations toda...
Internet security risks are becoming the leading security threats confronting today’s organizations ...