The Impact of Affective Flow on Information Security Policy Compliance
Dustin Ormond
2014
View PDFchevron_right
(2017) Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal Study, Information Systems Journal
Paul Benjamin Lowry
View PDFchevron_right
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
Pei-lee Teh
Information & Management, 2019
View PDFchevron_right
An Integrative Behavioral Model of Information Security Policy Compliance
Kyung Hoon Yang
The Scientific World Journal, 2014
View PDFchevron_right
(2015). “Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organizational information security policies," Information Systems Journal (ISJ)
Paul Benjamin Lowry
View PDFchevron_right
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
Princely Ifinedo
Information & Management, 2014
View PDFchevron_right
Explaining Opposing Compliance Motivations towards Organizational Information Security Policies
Greg Moody
2013 46th Hawaii International Conference on System Sciences, 2013
View PDFchevron_right
(2010). Be careful what you wish for: Proposing the IT policy control-reactance model (ITPCRM) to predict professionals’ intent to comply with new it security policies along with their resulting anger
Paul Benjamin Lowry
MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 1
View PDFchevron_right
Dispositional and situational factors: influences on information security policy violations
Allen C Johnston
European Journal of Information Systems, 2016
View PDFchevron_right
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Burcu Bulgurcu
View PDFchevron_right
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Greg Moody
Information Systems Journal, 2014
View PDFchevron_right
(2019). "The adaptive roles of positive and negative emotions in organizational insiders’ engagement in security-based precaution taking,” Information Systems Research (ISR)
A. J. Burns, Paul Benjamin Lowry
Information Systems Research, 2019
View PDFchevron_right
(2013). “Control-related motivations and information security policy compliance: The role of autonomy and efficacy,” Journal of Information Privacy and Security
Paul Benjamin Lowry
Journal of Information Privacy and Security
View PDFchevron_right
A research on information security compliance: an integrated model of socialization and cognition
Md Riyadh Hasan
View PDFchevron_right
Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy
Jeffrey Wall
Journal of Information Privacy and Security, 2013
View PDFchevron_right
Security awareness and affective feedback: Categorical behaviour vs. reported behaviour
Jacqueline Archibald
2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017
View PDFchevron_right
(2010). Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Intent to Comply with New It Security …
Paul Benjamin Lowry
Dewald Roode Workshop on IS Security Research 2010, IFIP WG 8.11 / 11.13, Waltham, Massachusetts, USA, October 8–9, 2010
View PDFchevron_right
Understanding Information Security Policy Violation from a Situational Action Perspective
Han Li
Journal of the Association for Information Systems, 2021
View PDFchevron_right
Information security policy noncompliance: An integrative social influence model
Kholekile Gwebu
Information Systems Journal, 2019
View PDFchevron_right
Stress-Based IS Security Compliance: Towards a Conceptual Model
Pham Hiep, Linda Brennan
View PDFchevron_right
(2018). "Information security policy violations: A grounded theory approach to counterfactual balance and tensions," Roode workshop
Paul Benjamin Lowry
View PDFchevron_right
Using Social Psychology to Implement Security Policies
Mani Akella
2015
View PDFchevron_right
Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance
Burcu Bulgurcu
2009
View PDFchevron_right
Factors Impacting Users’ Compliance with Information Security Policies: An Empirical Study
Latifa Alzahrani
International Journal of Advanced Computer Science and Applications
View PDFchevron_right
A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate
Dan J. Kim
SSRN Electronic Journal, 2013
View PDFchevron_right
Analyzing the role of Cognitive and Cultural Biases in the Internalization of Information Security Policies: Recommendations for Information Security Awareness Programs
Spyros Kokolakis
Computers & Security, 2015
View PDFchevron_right
Information Security Policies Compliance: The Role of Organizational Punishment
Mohammad Merhi
2013
View PDFchevron_right
Information security policy compliance model in organizations
Nader Sohrabi Safa
View PDFchevron_right
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
Princely Ifinedo
Computers & Security, 2012
View PDFchevron_right