Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in organizational security policies – are seen as a useful addition to securing informational assets in organizations. However, this exploratory study, based on findings obtained through 29 in-depth-interviews, challenges this positive perspective and shows that extra-role security behaviors cut both ways: They are either helpful or harmful. In addition, our results suggest that (1) ERSB contributes to varying degrees to the effectiveness of information security compliance, (2) the self-determination theory contributes to understanding the motivators for ERSB, and (3) the construal level theory of psychological distance explains the differential r...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
Information security is among the top organizational priorities. Theoretically, information security...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Although prior information security research predominantly focuses on organizational in-role securit...
[[abstract]]Although most behavioral security studies focus on organizational in-role behaviors such...
Recently, there has been increasing interest in studying desirable employee security behaviors, incl...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Many contemporary organizations pit on information security policy compliance to combat information ...
The purpose of this study is to explore the effect of formal and social control on in-role and extra...
Connecting mindfulness with organizational information security (InfoSec) is an increasingly attract...
Employees continue to be the weak link in organizational security management and efforts to improve ...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
Information systems security (ISS) is an increasingly critical issue for companies worldwide. One ma...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
Information security is among the top organizational priorities. Theoretically, information security...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Although prior information security research predominantly focuses on organizational in-role securit...
[[abstract]]Although most behavioral security studies focus on organizational in-role behaviors such...
Recently, there has been increasing interest in studying desirable employee security behaviors, incl...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Many contemporary organizations pit on information security policy compliance to combat information ...
The purpose of this study is to explore the effect of formal and social control on in-role and extra...
Connecting mindfulness with organizational information security (InfoSec) is an increasingly attract...
Employees continue to be the weak link in organizational security management and efforts to improve ...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
Information systems security (ISS) is an increasingly critical issue for companies worldwide. One ma...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
Information security is among the top organizational priorities. Theoretically, information security...
The body of research that focuses on employees’ information Security Policy compliance is problemati...