Construct: Normative beliefs
Also quoted in literature as:
- subjective norm
- workgroup norm
- social conformity
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
- Karahanna et al., 1999: Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs
- Siponen et al., 2010: Compliance with Information Security Policies: An Empirical Investigation
- Herath, 2009: Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness
- Bulgurcu et al., 2010: Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- Pahnila et al., 2007: Employees' Behavior towards IS Security Policy Compliance
- Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Zhang et al., 2009: Impact of Perceived Technical Protection on Security Behaviors
- Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
- Dugo, 2007: The Insider Threat to Organizational Information Security: A Structural Model and Empirical Test
- Guo et al., 2011: Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
- Workman, 2007: Punishment and Ethics Deterrents: A Study of Insider Security Contravention
The following constructs were (potentially) derived from this construct:
- Subjective norm by Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- Co-worker behaviour by Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- Attitude toward ISSP compliance by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- ISSP compliance behavioral intentions by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Detection probability by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Sanction severity by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Peer Behavior by Haeussinger, 2013: Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior
- Attitude toward ISSP compliance by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Subjective norms by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- ISSP compliance behavioral intentions by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory