Construct: Severity
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
The following constructs were (potentially) derived from this construct:
- Perceived certainty by Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- Perceived severity by Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- perceived sanctions by D'Arcy et al., 2014: Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
- Intention to misuse by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to misuse by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Neutralization by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived risk of Shame by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived informal risk by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived informal risk by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived formal Risk by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived formal Risk by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies