Construct: Attitude towards compliance
Also quoted in literature as:
- attitude
- personal norms
- attitude towards issp compliance
- Attitude towards compliance with ISOP
- Attitude toward ISSP compliance
- attitude towards information security policy and procedures
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
- Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Woon, 2007: Investigation of IS Professionals' Intention to Practise Secure Development of Applications
- Bulgurcu et al., 2010: Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- Herath, 2009: Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness
- Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Parsons et al., 2014: Determining Employee Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q)
- Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
- Pahnila et al., 2007: Employees' Behavior towards IS Security Policy Compliance
- Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Zhang et al., 2009: Impact of Perceived Technical Protection on Security Behaviors
- Bulgurcu et al., 2009: Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors
- Siponen et al., 2010: Compliance with Information Security Policies: An Empirical Investigation
- Venkatesh et al., 2003: User Acceptance of Information Technology: Toward a Unified View
The following constructs were (potentially) derived from this construct:
- Information security knowledge sharing by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security collaboration by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security intervention by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security experience by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attachment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Commitment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Personal norms by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- ISOP compliance behavioural intentions by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of incident by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived vulnerability by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response cost by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies