Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance (original) (raw)

The Impact of Affective Flow on Information Security Policy Compliance

Dustin Ormond

2014

View PDFchevron_right

(2017) Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal Study, Information Systems Journal

Paul Benjamin Lowry

View PDFchevron_right

Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization

Pei-lee Teh

Information & Management, 2019

View PDFchevron_right

An Integrative Behavioral Model of Information Security Policy Compliance

Kyung Hoon Yang

The Scientific World Journal, 2014

View PDFchevron_right

(2015). “Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organizational information security policies," Information Systems Journal (ISJ)

Paul Benjamin Lowry

View PDFchevron_right

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition

Princely Ifinedo

Information & Management, 2014

View PDFchevron_right

Explaining Opposing Compliance Motivations towards Organizational Information Security Policies

Greg Moody

2013 46th Hawaii International Conference on System Sciences, 2013

View PDFchevron_right

(2010). Be careful what you wish for: Proposing the IT policy control-reactance model (ITPCRM) to predict professionals’ intent to comply with new it security policies along with their resulting anger

Paul Benjamin Lowry

MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 1

View PDFchevron_right

Dispositional and situational factors: influences on information security policy violations

Allen C Johnston

European Journal of Information Systems, 2016

View PDFchevron_right

Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness

Burcu Bulgurcu

View PDFchevron_right

Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies

Greg Moody

Information Systems Journal, 2014

View PDFchevron_right

(2019). "The adaptive roles of positive and negative emotions in organizational insiders’ engagement in security-based precaution taking,” Information Systems Research (ISR)

A. J. Burns, Paul Benjamin Lowry

Information Systems Research, 2019

View PDFchevron_right

(2013). “Control-related motivations and information security policy compliance: The role of autonomy and efficacy,” Journal of Information Privacy and Security

Paul Benjamin Lowry

Journal of Information Privacy and Security

View PDFchevron_right

A research on information security compliance: an integrated model of socialization and cognition

Md Riyadh Hasan

View PDFchevron_right

Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy

Jeffrey Wall

Journal of Information Privacy and Security, 2013

View PDFchevron_right

Security awareness and affective feedback: Categorical behaviour vs. reported behaviour

Jacqueline Archibald

2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017

View PDFchevron_right

(2010). Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Intent to Comply with New It Security …

Paul Benjamin Lowry

Dewald Roode Workshop on IS Security Research 2010, IFIP WG 8.11 / 11.13, Waltham, Massachusetts, USA, October 8–9, 2010

View PDFchevron_right

Understanding Information Security Policy Violation from a Situational Action Perspective

Han Li

Journal of the Association for Information Systems, 2021

View PDFchevron_right

Information security policy noncompliance: An integrative social influence model

Kholekile Gwebu

Information Systems Journal, 2019

View PDFchevron_right

Stress-Based IS Security Compliance: Towards a Conceptual Model

Pham Hiep, Linda Brennan

View PDFchevron_right

(2018). "Information security policy violations: A grounded theory approach to counterfactual balance and tensions," Roode workshop

Paul Benjamin Lowry

View PDFchevron_right

Using Social Psychology to Implement Security Policies

Mani Akella

2015

View PDFchevron_right

Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance

Burcu Bulgurcu

2009

View PDFchevron_right

Factors Impacting Users’ Compliance with Information Security Policies: An Empirical Study

Latifa Alzahrani

International Journal of Advanced Computer Science and Applications

View PDFchevron_right

A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate

Dan J. Kim

SSRN Electronic Journal, 2013

View PDFchevron_right

Analyzing the role of Cognitive and Cultural Biases in the Internalization of Information Security Policies: Recommendations for Information Security Awareness Programs

Spyros Kokolakis

Computers & Security, 2015

View PDFchevron_right

Information Security Policies Compliance: The Role of Organizational Punishment

Mohammad Merhi

2013

View PDFchevron_right

Information security policy compliance model in organizations

Nader Sohrabi Safa

View PDFchevron_right

Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory

Princely Ifinedo

Computers & Security, 2012

View PDFchevron_right