Recently, there has been increasing interest in studying desirable employee security behaviors, including extra-role behavior in particular. The literature has predominantly focused on the benefits of extra-role behavior for organizational information security policy effectiveness. However, the negative outcomes of extra-role behavior have long been neglected. Therefore, drawing on the moral licensing theory, we investigate when extra-role behavior leads to employee security deviance. Specially, we see resource misuse and security carelessness as necessary forms of employee security deviance and proposes that extra-role behavior might lead to employee security deviance through psychological entitlement. This paper provides essential contrib...
Although prior information security research predominantly focuses on organizational in-role securit...
Employees continue to be the weak link in organizational security management and efforts to im-prove...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in or...
[[abstract]]Although most behavioral security studies focus on organizational in-role behaviors such...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
Many contemporary organizations pit on information security policy compliance to combat information ...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Employees’ information security policy (ISP) related behaviors have been paid attention by previous ...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Information security is a growing concern among the general population. For instance, it has been es...
Information security trends show that many studies focus on information security in investigating em...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
Employee`s information security behavior is critical to ensure the security of organization`s inform...
Although prior information security research predominantly focuses on organizational in-role securit...
Employees continue to be the weak link in organizational security management and efforts to im-prove...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in or...
[[abstract]]Although most behavioral security studies focus on organizational in-role behaviors such...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
Many contemporary organizations pit on information security policy compliance to combat information ...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Employees’ information security policy (ISP) related behaviors have been paid attention by previous ...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Information security is a growing concern among the general population. For instance, it has been es...
Information security trends show that many studies focus on information security in investigating em...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
Employee`s information security behavior is critical to ensure the security of organization`s inform...
Although prior information security research predominantly focuses on organizational in-role securit...
Employees continue to be the weak link in organizational security management and efforts to im-prove...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...