In this paper, we develop a theoretical framework for understanding the role guilt proneness plays in the Information Security Policy (ISP) compliance. We define guilt proneness as an emotional personality trait indicative of a predisposition to experience negative feeling about ISP violation. We develop a research model based on theory of planned behaviour, guilt proneness theory and rational choice theory to explain employees’ intentions to comply with ISPs by incorporating the guilt proneness as a moderator between benefit of compliance and benefit of violation as perceived by employees and their attitude towards compliance. Identifying the roles of predispositions like guilt proneness in the ISP compliance will have interesting theoreti...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
Academics and practitioners alike recognize employees as a major threat to organizational informatio...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
To encourage employees’ information security policy (ISP) compliance behavior, organizations impleme...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The use of sanctions has long been advocated to enforce information security policy (ISP) compliance...
The Internet and information technology have influenced human life significantly. However, informati...
The authors found the behavioral factors that influence the organization members’ compliance with th...
Security has become a crucial part of project management. In particular, insiders\u27 violation of i...
Employee violations of IS security policies are reported as a key concern for organizations. Althoug...
Information security is one of the major challenges for organizations that critically depend on info...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
The paper aims to identify behavioural theories that influence information security policies complia...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
Academics and practitioners alike recognize employees as a major threat to organizational informatio...
In this paper, we develop a theoretical framework for understanding the role guilt proneness plays i...
To encourage employees’ information security policy (ISP) compliance behavior, organizations impleme...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The use of sanctions has long been advocated to enforce information security policy (ISP) compliance...
The Internet and information technology have influenced human life significantly. However, informati...
The authors found the behavioral factors that influence the organization members’ compliance with th...
Security has become a crucial part of project management. In particular, insiders\u27 violation of i...
Employee violations of IS security policies are reported as a key concern for organizations. Althoug...
Information security is one of the major challenges for organizations that critically depend on info...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
The paper aims to identify behavioural theories that influence information security policies complia...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
Academics and practitioners alike recognize employees as a major threat to organizational informatio...