Dispositional and situational factors: influences on information security policy violations (original) (raw)

The Role of Situational Factors and Personality on Cybersecurity Policy Violation

Merrill Warkentin

2012

View PDFchevron_right

Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies1

Maranda McBride

View PDFchevron_right

Motivation and opportunity based model to reduce information security insider threats in organisations

Nader Sohrabi Safa

View PDFchevron_right

Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors

Burcu Bulgurcu

2009

View PDFchevron_right

Behavioral and policy issues in information systems security: The insider threat

Merrill Warkentin

European Journal of Information Systems, 2009

View PDFchevron_right

Personality and Employees’ Information Security Behavior among Generational Cohorts

Dr. Javaid Syed, Salem University, Salem, WV, U.S.A, Dr. Ruth M Tappin

Computer and Information Science, 2021

View PDFchevron_right

Examining the impact of deterrence factors and norms on resistance to Information Systems Security

Mohammad Merhi

Computers in Human Behavior, 2019

View PDFchevron_right

Antecedent factors of violation of information security rules

Alexandre Cappellozza

RAUSP Management Journal

View PDFchevron_right

Development and validation of instruments of information security deviant behavior

Beatriz de Sousa

View PDFchevron_right

Future directions for behavioral information security research

Merrill Warkentin

Computers and Security, 2013

View PDFchevron_right

Personality and IT security: An application of the five-factor model

Mark Schmidt

2006

View PDFchevron_right

(2024) "The antecedents of employees’ proactive information security behavior: The perspective of proactive motivation," ISJ

Tawei (David) Wang, Paul Benjamin Lowry, Feng Xu

Information Systems Journal, 2024

View PDFchevron_right

Deterrence and prevention-based model to mitigate information security insider threats in organisations

Nader Sohrabi Safa

View PDFchevron_right

A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate

Dan J. Kim

SSRN Electronic Journal, 2013

View PDFchevron_right

Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors

Lynne Coventry

2015

View PDFchevron_right

“The Insider Threat” Comparing malicious and non-malicious information security behaviours using a rational choice model

Sean Browne

2018

View PDFchevron_right

(2017) Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal Study, Information Systems Journal

Paul Benjamin Lowry

View PDFchevron_right

Evolvement of Information Security Research on Employees' Behavior: A Systematic Review and Future Direction

Mohamed Askar

2015 48th Hawaii International Conference on System Sciences, 2015

View PDFchevron_right

Personality Difference Associated with the Information Security Performance of Employees’ in the Information Network Security Agency (INSA)

Anemut Mehari

2022

View PDFchevron_right

Employee Rule Breakers, Excuse Makers and Security Champions

Angela Sasse

Proceedings of the 2015 New Security Paradigms Workshop, 2015

View PDFchevron_right

(2010). Be careful what you wish for: Proposing the IT policy control-reactance model (ITPCRM) to predict professionals’ intent to comply with new it security policies along with their resulting anger

Paul Benjamin Lowry

MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 1

View PDFchevron_right

Organizational Climate and Individual Factors Effects on Information Security Compliance Behaviour

Adnan Ajis

2013

View PDFchevron_right

A behavioral theory of insider-threat risks

Ignacio J . Martinez-Moyano

ACM Transactions on Modeling and Computer Simulation, 2008

View PDFchevron_right

Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model

Norm Archer

2011

View PDFchevron_right

(2011). Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations

Paul Benjamin Lowry

Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51

View PDFchevron_right

An Integrative Behavioral Model of Information Security Policy Compliance

Kyung Hoon Yang

The Scientific World Journal, 2014

View PDFchevron_right

Factors Influencing Employees' Participation in Non-Malicious, Information Systems Security Deviant Behavior: Focus on Formal Control Mechanisms and Sanctions

Princely Ifinedo

2017

View PDFchevron_right

Understanding Information Security Policy Violation from a Situational Action Perspective

Han Li

Journal of the Association for Information Systems, 2021

View PDFchevron_right

The dark side of leadership in information systems security: A model of the effect of manager transgressions on employee security behaviors

Jeffrey Wall

View PDFchevron_right

Exploring the Impacts of Individual Styles on Security Compliance Behavior: A Preliminary Analysis

Kweku-Muata Osei-Bryson

2017

View PDFchevron_right