Security Constructs
Home
Categories
Constructs
Publications
Construct:
intention to violate information security policies
Also quoted in literature as:
ISSP Violation intention
This construct belongs to the following categories:
Intention
This construct is used by:
Cheng et al., 2013:
Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
Questions given: yes
Johnston et al., 2016:
Dispositional and Situational Factors: Influences on Information Security Policy Violations
Questions given: yes
The following constructs were (potentially) derived from this construct:
Information security knowledge sharing
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations
Information security collaboration
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations
Information security intervention
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations
Information security experience
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations
Attachment
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations
Commitment
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations
Personal norms
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations
Attitude towards compliance with ISOP
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations
ISOP compliance behavioural intentions
by Sohrabi Safa et al., 2016:
Information Security Policy Compliance Model in Organizations