Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization (original) (raw)

(2017) Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal Study, Information Systems Journal

Paul Benjamin Lowry

View PDFchevron_right

Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance

Dustin Ormond

Journal of the Association for Information Systems, 2019

View PDFchevron_right

The Impact of Affective Flow on Information Security Policy Compliance

Dustin Ormond

2014

View PDFchevron_right

Stress-Based IS Security Compliance: Towards a Conceptual Model

Pham Hiep, Linda Brennan

View PDFchevron_right

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition

Princely Ifinedo

Information & Management, 2014

View PDFchevron_right

(2019). "The adaptive roles of positive and negative emotions in organizational insiders’ engagement in security-based precaution taking,” Information Systems Research (ISR)

A. J. Burns, Paul Benjamin Lowry

Information Systems Research, 2019

View PDFchevron_right

Applying attitude theory to determine user security approaches

Andrea Tick

Serbian Journal of Management, 2024

View PDFchevron_right

Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors

Lynne Coventry

2015

View PDFchevron_right

(2010). Be careful what you wish for: Proposing the IT policy control-reactance model (ITPCRM) to predict professionals’ intent to comply with new it security policies along with their resulting anger

Paul Benjamin Lowry

MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 1

View PDFchevron_right

Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals

Paul Benjamin Lowry

Computers in Human Behavior, 2017

View PDFchevron_right

Mr Hyde Or Dr. Jekyll? Characteristics Of The Information Systems Security Mindset

David Pumphrey

2014

View PDFchevron_right

Examining technostress creators and role stress as potential threats to employees' information security compliance

Oona Cha

Computers in Human Behavior, 2018

View PDFchevron_right

Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model

Kichan Nam

AIS Transactions on Replication Research, 2018

View PDFchevron_right

Unveiling Workplace Stress: The Imperative for Organizational Action

Nitish Shrivastava

Saudi journal of engineering and technology, 2023

View PDFchevron_right

Information security policy compliance model in organizations

Nader Sohrabi Safa

Computers & Security, 2016

View PDFchevron_right

Information System Security Threats and Vulnerabilities: Evaluating the Human Factor in Data Protection

Frimpong Twum

International Journal of Computer Applications, 2016

View PDFchevron_right

Explaining Opposing Compliance Motivations towards Organizational Information Security Policies

Greg Moody

2013 46th Hawaii International Conference on System Sciences, 2013

View PDFchevron_right

Exposure to negative acts at work, psychological stress reactions and physiological stress response

Åse Hansen

Journal of Psychosomatic Research, 2012

View PDFchevron_right

Behavioral and policy issues in information systems security: the insider threat

Robert Willison

European Journal of Information Systems, 2009

View PDFchevron_right

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

Dennis Galletta

MIS Quarterly

View PDFchevron_right

Dispositional and situational factors: influences on information security policy violations

Allen C Johnston

European Journal of Information Systems, 2016

View PDFchevron_right

Stress Dynamics of Information Systems Managers: A Contingency Model

Rami Shani

Journal of Management Information Systems, 1991

View PDFchevron_right

(2021) “Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model,” Information Systems Research (ISR)

Robert Luo, Robert Willison, Paul Benjamin Lowry

Information Systems Reserach, 2021

View PDFchevron_right

(2016). Examining the influence of organisational insiders’ psychological capital on information security threat and coping appraisals, Computers in Human Behavior

A. J. Burns, Paul Benjamin Lowry

View PDFchevron_right

Management Attitudes toward Information Security in Omani Public Sector Organisations

George R S Weir

2016 Cybersecurity and Cyberforensics Conference (CCC), 2016

View PDFchevron_right

Evolvement of Information Security Research on Employees' Behavior: A Systematic Review and Future Direction

Mohamed Askar

2015 48th Hawaii International Conference on System Sciences, 2015

View PDFchevron_right

Job stress, emotion, and work environment: Toward a causal model

Geerd Weyer

Personality and Individual Differences, 1988

View PDFchevron_right

(2015). “Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organizational information security policies," Information Systems Journal (ISJ)

Paul Benjamin Lowry

View PDFchevron_right

Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies1

Maranda McBride

View PDFchevron_right

Evaluating measures to improve personal security and the value of their benefits

Phani Chintakayala

View PDFchevron_right

Employee Rule Breakers, Excuse Makers and Security Champions

Angela Sasse

Proceedings of the 2015 New Security Paradigms Workshop, 2015

View PDFchevron_right

Effects of Stress on Employee Productivity

Oboreh Justin

International Journal of Accounting Research, 2016

View PDFchevron_right

Exploratory Factor Analysis of User’s Compliance Behaviour towards Health Information System’s Security

Norshima Humaidi

Journal of Health & Medical Informatics, 2013

View PDFchevron_right

I Cannot Afford to Have a Life: Employee Adaptation to Feelings of Job Insecurity

Wendy Boswell

Personnel Psychology, 2013

View PDFchevron_right

A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate

Dan J. Kim

SSRN Electronic Journal, 2013

View PDFchevron_right