1 |
T. Herath & H. R. Rao. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, Decision Support Systems, 47(2), 154-165.
DOI
|
2 |
B. Bulgurcu, H. Cavusoglu & I. Benbasat. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, 34(3), 523-548.
DOI
|
3 |
M. Siponen, S. Pahnila & M. A. Mahmood. (2010). Compliance with information security policies: An empirical investigation. Computer, 43(2), 64-71.
DOI
|
4 |
Q. Hu, Z. Xu, T. Dinev & H. Ling. (2011). Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, 54(6), 54-60.
DOI
|
5 |
Y. Chen, K. Ramamurthy & K. W. Wen. (2012). Organizations' information security policy compliance: Stick or carrot approach?, Journal of Management Information Systems, 29(3), 157-188.
DOI
|
6 |
C. Park & M. Yim. (2012). An understanding of impact of security countermeasures on persistent policy compliance. Journal of Digital Convergence, 10(4), 23-35.
DOI
|
7 |
A. Vance, M. Siponen & S. Pahnila. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, 49(3), 190-198.
DOI
|
8 |
Z. Ouyang, J. Sang, P. Li, P & J. Peng. (2015). Organizational justice and job insecurity as mediators of the effect of emotional intelligence on job satisfaction: A study from China. Personality and Individual Differences, 76, 147-152.
DOI
|
9 |
C. B. Meyer. (2001). Allocation processes in mergers and acquisitions: An organizational justice perspective. British Journal of Management, 12(1), 47-66.
DOI
|
10 |
S. W. Hystad, K. J. Mearns & J. Eid. (2014). Moral disengagement as a mechanism between perceptions of organisational injustice and deviant work behaviours. Safety Science, 68, 138-145.
DOI
|
11 |
J. Y. Son & J. Park. (2016). Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns. International Journal of Information Management, 36(3), 309-321.
DOI
|
12 |
H. Zhang & N. C. Agarwal. (2009). The mediating roles of organizational justice on the relationships between HR practices and workplace outcomes: an investigation in China. The International Journal of Human Resource Management, 20(3), 676-693.
DOI
|
13 |
E. A. Locke & G. P. Latham. (2006). New directions in goal-setting theory. Current Directions in Psychological Science, 15(5), 265-268.
DOI
|
14 |
E. A. Locke & G. P. Latham (2002). Building a practically useful theory of goal setting and task motivation: A 35-year odyssey. American Psychologist, 57(9), 705-717.
DOI
|
15 |
B. E. Wright & B. S. Davis. (2003). Job satisfaction in the public sector: The role of the work environment. The American Review of Public Administration, 33(1), 70-90.
DOI
|
16 |
J. A. Colquitt. (2001). On the dimensionality of organizational justice: a construct validation of a measure. Journal of Applied Psychology, 86(3), 386-400.
DOI
|
17 |
L. J. Williams & S. E. Anderson. (1994). An alternative approach to method effects by using latent-variable models: Applications in organizational behavior research. Journal of Applied Psychology, 79(3), 323-331.
DOI
|
18 |
I. Hwang & Y. Lee. (2016). The employee's information security policy compliance intention: Theory of planned behavior, goal setting theory, and deterrence theory applied, Journal of Digital Convergence, 14(7), 155-166.
DOI
|
19 |
R. H. Moorman. (1991). Relationship between organizational justice and organizational citizenship behaviors: Do fairness perceptions influence employee citizenship?, Journal of Applied Psychology, 76(6), 845-855.
DOI
|
20 |
B. E. Wright. (2004). The role of work context in work motivation: A public sector application of goal and social cognitive theories. Journal of Public Administration Research and Theory, 14(1), 59-78.
DOI
|
21 |
M. T. Tsai & N. C. Cheng. (2012). Understanding knowledge sharing between IT professionals-an integration of social cognitive and social exchange theory. Behaviour & Information Technology, 31(11), 1069-1080.
DOI
|
22 |
A. Vance, M. Siponen & S. Pahnila. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, 49(3), 190-198.
DOI
|
23 |
Y. Zhang, J. A. LePine, B. R. Buckman & F. Wei. (2014). It's not fair… or is it? The role of justice and leadership in explaining work stressor-job performance relationships. Academy of Management Journal, 57(3), 675-697.
DOI
|
24 |
R. West. (2008). The psychology of security. Communications of the ACM, 51(4), 34-40.
DOI
|
25 |
M. S. Yim. (2012). A path way to increase the intention to comply with information security policy of employees. Journal of Digital Convergence, 10(10), 119-128.
DOI
|
26 |
P. M. Muchinsky. (2006). Psychology applied to work: An introduction to industrial and organizational psychology. Cengage Learning.
|
27 |
P. E. Spector. (2009). Industrial and organizational psychology. Research and. Practice.
|
28 |
T. A. Judge & J. A. Colquitt. (2004). Organizational justice and stress: the mediating role of work-family conflict. Journal of Applied Psychology, 89(3), 395-404.
DOI
|
29 |
H. Li, R. Sarathy, J. Zhang & X. Luo. (2014). Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Information Systems Journal, 24(6), 479-502.
DOI
|
30 |
J. M. Diefendorff & G. A. Seaton, G. A. (2015). Work motivation. International encyclopedia of the social & behavioral sciences, 2nd edn. Elsevier, Oxford, pp.680-686.
|
31 |
C. C. Pinder. (1998). Work motivation in organizational behavior, Upper Saddle River, NJ: Prentice Hall.
|
32 |
I. Hwang, D. Kim, T. Kim & S. Kim. (2017). Why not comply with information security? An empirical approach for the causes of non-compliance, Online Information Review, 41(1), 1-17.
|
33 |
Verizon. (2017). 2017 data breach investigations report.
|
34 |
I. Hwang & D. Kim. (2016). The effect of organizational information security environment on the compliance intention of employee, The Journal of Information Systems, 25(2), 51-77.
DOI
|
35 |
D. Kim, I. Hwang & J. Kim. (2016). A study on employee's compliance behavior towards information security policy: A modified triandis model, Journal of Digital Convergence, 14(4), 209-220.
DOI
|
36 |
J. D'Arcy, A. Hovav & D. Galletta. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, Information Systems Research, 20(1), 79-98.
DOI
|
37 |
IDC. (2016). Worldwide semiannual security spending guide.
|
38 |
K. D. Loch, H. H. Carr & M. E. Warkentin. (1992). Threats to information systems: today's reality, yesterday's understanding, MIS Quarterly, 16(2), 173-186.
DOI
|
39 |
A. B. Ruighaver, S. B. Maynard & S. Chang. (2007). Organisational security culture: Extending the end-user perspective. Computers & Security, 26(1), 56-62.
DOI
|
40 |
E. A. Locke & G. P. Latham. (1990). Work motivation and satisfaction: Light at the end of the tunnel. Psychological Science, 1(4), 240-246.
DOI
|
41 |
I. Koskosas. (2008). Goal setting and trust in a security management context. Information Security Journal: A Global Perspective, 17(3), 151-161.
DOI
|
42 |
A. Li & A. B. Butler. (2004). The effects of participation in goal setting and goal rationales on goal commitment: An exploration of justice mediators. Journal of Business and Psychology, 19(1), 37-51.
DOI
|
43 |
Y. Chen, K. Ramamurthy, & K. W. Wen. (2012). Organizations' information security policy compliance: Stick or carrot approach?. Journal of Management Information Systems, 29(3), 157-188.
DOI
|
44 |
J. C. Nunnally. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
|
45 |
B. H. Wixom & H. J. Watson. (2001). An empirical investigation of the factors affecting data warehousing success. MIS Quarterly, 25(1), 17-41.
DOI
|
46 |
C. Fornell & D. F. Larcker. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
DOI
|
47 |
P. M. Podsakoff, S. B. MacKenzie, J. Y. Lee & N. P. Podsakoff. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
DOI
|