2012
DOI: 10.1016/j.im.2012.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

13
369
8
3

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 532 publications
(393 citation statements)
references
References 18 publications
13
369
8
3
Order By: Relevance
“…High propensity for compliance has been associated with high degree of security. Vance, Siponen, and Pahnila (2012) integrated habit with protection motivation theory (PMT) to explain compliance. The authors concluded that habitual compliance with security policies strongly reinforced the cognitive processes theorized by PMT.…”
Section: Security and Habit Researchmentioning
confidence: 99%
“…High propensity for compliance has been associated with high degree of security. Vance, Siponen, and Pahnila (2012) integrated habit with protection motivation theory (PMT) to explain compliance. The authors concluded that habitual compliance with security policies strongly reinforced the cognitive processes theorized by PMT.…”
Section: Security and Habit Researchmentioning
confidence: 99%
“…When companies motivate their employees to have InfoSec compliance, they are not only enhancing employee protection behavior but also training them to get a new habit. Previous studies indicate that habit has a significant role in the context of employee's compliances with company InfoSec policies [27]. When InfoSec protection becomes a habit, employees will continue following InfoSec policies without strong enforcement from managers.…”
Section: Practical Implicationsmentioning
confidence: 99%
“…Most studies on information security policies have focused on identifying whether punishments and rewards based on compulsion significantly increase employees' intention to comply with information security policies [18,32] or their awareness of information security through education and training [14,26]. Forcing employees to comply with information security policies based on these external environmental factors does not lead to continuous improvements in their intent to comply [21].…”
Section: Introductionmentioning
confidence: 99%