Construct: Intention to comply
Also quoted in literature as:
- information system security policy compliance behavioral intentions
- policy compliance intentions
- behavioral intention
- internet use policy compliance intention
- security policy compliance intention
- hypothetical compliance
- intention to comply with the information security policy
- compliance intention
- ISOP compliance behavioural intentions
- ISSP compliance behavioral intentions
- Security compliance intention
- IUP compliance intention
This construct belongs to the following categories:
This construct is used by:
-
Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
Questions given: yes
-
Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
Questions given: yes
-
Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
Questions given:
-
D'Arcy, 2014: Security Culture and the Employment Relationship as Drivers of Employees' Security Compliance
Questions given: yes
-
Siponen et al., 2014: Employees' Adherence to Information Security Policies: An Exploratory Field Study
Questions given: yes, in English
-
Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
Questions given: example
-
Aleassa et al., 2011: Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action
Questions given: no
-
Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
Questions given: yes
-
Karlsson et al., 2017: Measuring Employees' Compliance \textendash the Importance of Value Pluralism
Questions given: yes
Papers using this construct cite the following papers for the source of this construct:
- Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Woon, 2007: Investigation of IS Professionals' Intention to Practise Secure Development of Applications
- Herath, 2009: Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness
- Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Limayem et al., 2004: Factors Motivating Software Piracy: A Longitudinal Study
- Peace et al., 2003: Software Piracy in the Workplace: A Model and Empirical Test
- Siponen et al., 2010: Compliance with Information Security Policies: An Empirical Investigation
- Pahnila et al., 2007: Employees' Behavior towards IS Security Policy Compliance
- Zhang et al., 2009: Impact of Perceived Technical Protection on Security Behaviors
- Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
- Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Bulgurcu et al., 2010: Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- Bulgurcu et al., 2010: Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Empirical Investigation
- Myyry et al., 2009: What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study
- Vance et al., 2012: Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory
The following constructs were (potentially) derived from this construct:
- Information security knowledge sharing by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security collaboration by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security intervention by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security experience by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attachment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Commitment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Personal norms by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attitude towards compliance with ISOP by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Perceived certainty by Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- Perceived severity by Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- Personal norms by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Intention to Comply by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Self-Efficacy by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Subjective Norm by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Moral Obligation by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Utilitarianism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Formalism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Ethical Egoism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Attitude by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived benefits of non-compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of incident by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of sanctions by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived Certainty of Sanctions by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived vulnerability by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived vulnerability by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response cost by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies