Construct: Self-efficacy
Also quoted in literature as:
This construct belongs to the following categories:
This construct is used by:
-
Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
Questions given: yes
-
Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
Questions given: yes
-
Workman et al., 2008: Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test
Questions given: yes
-
Woon, 2007: Investigation of IS Professionals' Intention to Practise Secure Development of Applications
Questions given: yes
-
Tamjidyamcholo et al., 2013: Information Security \textendash Professional Perceptions of Knowledge-Sharing Intention under Self-Efficacy, Trust, Reciprocity, and Shared-Language
Questions given: yes
-
Kuo, 2008: A Study of the Intention\textendashAction Gap in Knowledge Sharing Practices
Questions given: yes
-
Siponen et al., 2014: Employees' Adherence to Information Security Policies: An Exploratory Field Study
Questions given: yes, in English
-
Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
Questions given: example
-
Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
Questions given: yes
-
Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
Questions given: yes
-
Karlsson et al., 2017: Measuring Employees' Compliance \textendash the Importance of Value Pluralism
Questions given: yes
Papers using this construct cite the following papers for the source of this construct:
- Woon, 2007: Investigation of IS Professionals' Intention to Practise Secure Development of Applications
- Workman et al., 2008: Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test
- Compeau, 1995: Computer Self-Efficacy: Development of a Measure and Initial Test
- Taylor, 1995: Understanding Information Technology Usage: A Test of Competing Models
- Rotter, 1966: Generalized Expectancies for Internal Versus External Control of Reinforcement
- Harrington, 1996: The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions
- Bhattacherjee, 2000: Acceptance of E-Commerce Services: The Case of Electronic Brokerages
- Pedersen, 2001: Adoption of Mobile Commerce: An Exploratory Analysis
- Fang, 2010: In Justice We Trust: Exploring Knowledge-Sharing Continuance Intentions in Virtual Communities of Practice
- Hsu et al., 2007: Knowledge Sharing Behavior in Virtual Communities: The Relationship between Trust, Self-Efficacy, and Outcome Expectations
- Bandura, 1995: Guide for Constructing Self-Efficacy Scales
- Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Bulgurcu et al., 2010: Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- Siponen et al., 2010: Compliance with Information Security Policies: An Empirical Investigation
- Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Son, 2011: Out of Fear or Desire? Toward a Better Understanding of Employees' Motivation to Follow IS Security Policies
- Chan et al., 2005: Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior
- Lee, 2009: Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software
The following constructs were (potentially) derived from this construct:
- Information security knowledge sharing by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security collaboration by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security intervention by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security experience by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attachment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Commitment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Personal norms by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attitude towards compliance with ISOP by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- ISOP compliance behavioural intentions by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Commitment by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Attitude toward ISSP compliance by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Attitude toward ISSP compliance by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Locus of control by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Self-efficacy by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Self-efficacy by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- ISSP compliance behavioral intentions by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- ISSP compliance behavioral intentions by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Detection probability by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Sanction severity by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Information security risk reduction expectation by Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Knowledge self-efficacy by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Subjective norm by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Subjective norm by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Intention to Comply by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Self-Efficacy by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Subjective Norm by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Moral Obligation by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Utilitarianism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Formalism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Ethical Egoism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Attitude by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Descriptive norm by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Organizational commitment by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of incident by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of sanctions by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived Certainty of Sanctions by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived vulnerability by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response cost by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response cost by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Threat appraisal by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Response efficacy by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Perceived threat by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Information Security Policy Provision by Haeussinger, 2013: Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior
- Perceived severity by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Perceived vulnerability by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Response cost by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Response efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Attitude toward ISSP compliance by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Attitude toward ISSP compliance by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Subjective norms by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Subjective norms by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Self-efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Self-efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- ISSP compliance behavioral intentions by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- ISSP compliance behavioral intentions by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory