Many existing literatures focus on the effect of external influence mechanism (e.g. fear appeals) that impact on information security policy compliance (ISPC). In this study, we aim to explore the formation of ISPC in the perspective of autonomous motivation based on social exchange theory and self-determination theory. Participants were 261 employees (44% were women). Hypotheses were tested by hierarchical regression analysis. Statistical Product and Service Solutions (SPSS) 19.0 (including PROCESS) as well as R 4.0.2 were used to analyze the data. The results showed that (1) Job satisfaction and personal responsibility have positive impacts on ISPC. (2) Job satisfaction can promote the formation of personal responsibility, and deterrence ...
Employees’ non-compliance with information systems security policies has been identified as a major ...
Information security policy compliance requires commitment both from organizations and their employe...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Employees' failures to follow information security policy can be costly to organizations, causing or...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
Information security research shows that employees are a source of some of the security incidents in...
Information systems security (ISS) is an increasingly critical issue for companies worldwide. One ma...
Purpose – Employee compliance with information system security policies (ISSPs) has been emphasized ...
Employees ’ failures to follow information security policy can be costly to organizations. Organizat...
Noncompliance by employees with Information Systems security policies is a serious computer security...
Information security in an organization largely depends on employee compliance with information secu...
Employees’ non-compliance with organizational information security policy (ISP) when using informati...
This dissertation is centered on investigating how employees' intrinsic motivation mediates the rela...
Information security policy effectiveness relies on how well an individual employee can follow the s...
Employees’ non-compliance with information systems security policies has been identified as a major ...
Information security policy compliance requires commitment both from organizations and their employe...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Employees' failures to follow information security policy can be costly to organizations, causing or...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
Information security research shows that employees are a source of some of the security incidents in...
Information systems security (ISS) is an increasingly critical issue for companies worldwide. One ma...
Purpose – Employee compliance with information system security policies (ISSPs) has been emphasized ...
Employees ’ failures to follow information security policy can be costly to organizations. Organizat...
Noncompliance by employees with Information Systems security policies is a serious computer security...
Information security in an organization largely depends on employee compliance with information secu...
Employees’ non-compliance with organizational information security policy (ISP) when using informati...
This dissertation is centered on investigating how employees' intrinsic motivation mediates the rela...
Information security policy effectiveness relies on how well an individual employee can follow the s...
Employees’ non-compliance with information systems security policies has been identified as a major ...
Information security policy compliance requires commitment both from organizations and their employe...
Many organizations recognize that their employees, who are often considered the weakest link in info...