Construct: Organizational commitment
Also quoted in literature as:
- commitment
- Organisational commitment
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
- Cabrera et al., 2006: Determinants of Individual Engagement in Knowledge Sharing
- van den Hooff, 2004: Knowledge Sharing in Context: The Influence of Organizational Commitment, Communication Climate and CMC Use on Knowledge Sharing
- Lin, 2007: To Share or Not to Share: Modeling Knowledge Sharing Using Exchange Ideology as a Moderator
- Lawson et al., 2009: Knowledge Sharing in Interorganizational Product Development Teams: The Effect of Formal and Informal Socialization Mechanisms
- Zboralski, 2009: Antecedents of Knowledge Sharing in Communities of Practice
- Quigley et al., 2007: A Multilevel Investigation of the Motivational Mechanisms Underlying Knowledge Sharing and Performance
- Barge, 1988: A Critical Evaluation of Organizational Commitment and Identification
- Mowday et al., 1979: The Measurement of Organizational Commitment
- O'Reilly, 1986: Organizational Commitment and Psychological Attachment: The Effects of Compliance, Identification, and Internalization on Prosocial Behavior.
- Wasko, 2005: Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice
- Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Dugo, 2007: The Insider Threat to Organizational Information Security: A Structural Model and Empirical Test
- Lee et al., 2004: An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories
The following constructs were (potentially) derived from this construct:
- Information security knowledge sharing by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security collaboration by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security intervention by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security experience by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attachment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Commitment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Personal norms by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attitude towards compliance with ISOP by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- ISOP compliance behavioural intentions by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Commitment by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Attitude toward ISSP compliance by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- ISSP compliance behavioral intentions by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Detection probability by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Sanction severity by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Knowledge self-efficacy by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Knowledge self-efficacy by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Intrinsic KS motivation by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Intrinsic KS motivation by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Participation by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Organizational commitment by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Organizational commitment by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Shared goals by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- KM resources/technology by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Organizational support of KS by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Anticipated pay increase/promotion by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Anticipated reciprocal relationships by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Reputation building by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Intention to Comply by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Self-Efficacy by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Subjective Norm by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Moral Obligation by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Utilitarianism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Formalism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Ethical Egoism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Attitude by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Descriptive norm by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Organizational commitment by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of sanctions by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived Certainty of Sanctions by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response cost by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Threat appraisal by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Information Security Policy Provision by Haeussinger, 2013: Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior
- Attitude toward ISSP compliance by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Subjective norms by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- ISSP compliance behavioral intentions by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory