Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules. Design/methodology/approach The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems. Findings The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention. Research limita...
Information security trends show that many studies focus on information security in investigating em...
Information security is a growing concern among the general population. For instance, it has been es...
The extant literature analyzing information system security policy violations has primarily focused ...
Purpose – This paper aims to investigate the influence of moral disengagement, perceived penalty, ne...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
As security breaches in organisations are on the rise, developing an understanding of factors enabli...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
The purpose of this study is to methodologically replicate the model presented by D’Arcy et al. (201...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
Information security is one of the major challenges for organizations that critically depend on info...
Information security trends show that many studies focus on information security in investigating em...
Information security is a growing concern among the general population. For instance, it has been es...
The extant literature analyzing information system security policy violations has primarily focused ...
Purpose – This paper aims to investigate the influence of moral disengagement, perceived penalty, ne...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
As security breaches in organisations are on the rise, developing an understanding of factors enabli...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
The purpose of this study is to methodologically replicate the model presented by D’Arcy et al. (201...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
Information security is one of the major challenges for organizations that critically depend on info...
Information security trends show that many studies focus on information security in investigating em...
Information security is a growing concern among the general population. For instance, it has been es...
The extant literature analyzing information system security policy violations has primarily focused ...