2016
DOI: 10.1057/ejis.2015.15
|View full text |Cite
|
Sign up to set email alerts
|

Dispositional and situational factors: influences on information security policy violations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
67
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 140 publications
(71 citation statements)
references
References 85 publications
4
67
0
Order By: Relevance
“…These messages are often communicated via email and other forms of mass organizational communication because they can cost‐effectively reach wide audiences. But with mass communication, these messages can easily end up being generic or undifferentiated and subsequently not considered by some members of the target audience because they do not match these members’ expectations for the communication, perspectives on the topic of communication, or preferences for how the communication should be structured (Te'eni, ; Johnston, McBride, Carter, & Warkentin, ). Fortunately, scholars continue to advance our understanding of effective fear appeal communication strategies (Ruiter et al., ) and have provided a solid foundation upon which to enhance their effectiveness even further.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…These messages are often communicated via email and other forms of mass organizational communication because they can cost‐effectively reach wide audiences. But with mass communication, these messages can easily end up being generic or undifferentiated and subsequently not considered by some members of the target audience because they do not match these members’ expectations for the communication, perspectives on the topic of communication, or preferences for how the communication should be structured (Te'eni, ; Johnston, McBride, Carter, & Warkentin, ). Fortunately, scholars continue to advance our understanding of effective fear appeal communication strategies (Ruiter et al., ) and have provided a solid foundation upon which to enhance their effectiveness even further.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…Although data were collected from individual decision makers in individual scenario evaluations, we did not account for individual differences, which have been shown to exert a significant influence on an employee's computer security actions (Johnston et al, ). Future research might control for many other individual‐level factors, such as dispositional differences in the way that individuals perceive sanctions, threats and responses, as well as key differences in the way that security policy compliance messages are received and processed by individuals (Johnston et al, ; Warkentin et al, ).…”
Section: Discussionmentioning
confidence: 99%
“…PMT for information security was extended by Johnston and Warkentin (2010) who argued that it invokes two separate appraisals, the threat (severity and likelihood) and the response (efficacy, cost, and one's self-efficacy to enact it). Studies have examined habit and PMT (Vance, Siponen, & Pahnila, 2012), used PMT and DT to further examine compliance (Johnston et al, 2015), and various extensions to PMT and fear appeals (Crossler et al, 2013;Johnston et al, 2016;Warkentin et al, 2011;Willison & Warkentin, 2013). For our phishing example, PMT would argue that an employee receiving an email with a link would first assess the likelihood that it was a threat and the magnitude of threat, and then assess the response cost (and efficacy and self-efficacy) of not clicking the link.…”
Section: Phishingmentioning
confidence: 99%
“…Much research has examined behavioral compliance (Johnston, Warkentin, McBride, & Carter, 2016;Johnston, Warkentin, & Siponen, 2015;Moody, Siponen, & Pahnila, 2018;Siponen & Vance, 2010), and many theories have been useful in explaining compliance behavior (e.g., Straub & Collins, 1990;Workman, Bommer, & Straub, 2008). Like most theories in information systems research, these theories quite naturally assume a rational actor thinking about and planning his or her behavior.…”
Section: Introductionmentioning
confidence: 99%