This paper examines the underlying mechanisms through which Paternalistic Leadership (PL) motivates employees’ Information Systems Policy (ISP) Compliance. We propose that the three dimensions of PL, Authoritarian Leadership (AL), Benevolent Leadership (BL) and Moral Leadership (ML), influence employees’ ISP compliance by affecting their perceptions of two information security control mechanisms: Sanctions and the Information Security Climate. Based on survey data taken from 760 participants, we found that the impact of AL is partially mediated by perceived Sanctions, the impact of BL is partially mediated by perceived Information Security Climate, and the impact of ML is partially mediated by both perceived Sanctions and the Information Se...
Information security in an organization largely depends on employee compliance with information secu...
Recent reports indicate that IS users’ resistance to use information systems security policies is th...
Why do some employees go out of their way to follow prescribed information security protocols, while...
This paper studies the influencing mechanisms of Paternalistic Leadership in motivating employees\u2...
This paper studies the influencing mechanisms of Paternalistic Leadership in motivating employees’ I...
Leadership plays an important role in changing employees’ behavior. This paper aims to investigate t...
Leadership plays an important role in changing employees’ behavior. This paper aims to investigate t...
This empirical study examined the behavioral influences of leaders on employees’ security compliance...
Employees’ information security policy (ISP) related behaviors have been paid attention by previous ...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Employees’ non-compliance with organizational information security policy (ISP) when using informati...
Information security policy compliance requires commitment both from organizations and their employe...
The importance of organizational information security is constantly increasing. Next to technical in...
Employees have been considered as one of the major threats to organizational information security. P...
Information security is one of the major challenges for organizations that critically depend on info...
Information security in an organization largely depends on employee compliance with information secu...
Recent reports indicate that IS users’ resistance to use information systems security policies is th...
Why do some employees go out of their way to follow prescribed information security protocols, while...
This paper studies the influencing mechanisms of Paternalistic Leadership in motivating employees\u2...
This paper studies the influencing mechanisms of Paternalistic Leadership in motivating employees’ I...
Leadership plays an important role in changing employees’ behavior. This paper aims to investigate t...
Leadership plays an important role in changing employees’ behavior. This paper aims to investigate t...
This empirical study examined the behavioral influences of leaders on employees’ security compliance...
Employees’ information security policy (ISP) related behaviors have been paid attention by previous ...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Employees’ non-compliance with organizational information security policy (ISP) when using informati...
Information security policy compliance requires commitment both from organizations and their employe...
The importance of organizational information security is constantly increasing. Next to technical in...
Employees have been considered as one of the major threats to organizational information security. P...
Information security is one of the major challenges for organizations that critically depend on info...
Information security in an organization largely depends on employee compliance with information secu...
Recent reports indicate that IS users’ resistance to use information systems security policies is th...
Why do some employees go out of their way to follow prescribed information security protocols, while...