An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Han, JinYoung | - |
dc.contributor.author | Kim, Yoo Jung | - |
dc.contributor.author | Kim, Hyungjin | - |
dc.date.available | 2019-03-08T08:56:25Z | - |
dc.date.issued | 2017-05 | - |
dc.identifier.issn | 0167-4048 | - |
dc.identifier.issn | 1872-6208 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/4465 | - |
dc.description.abstract | Organizations are trying to induce employees to comply with information security policy (ISP) as organizational damage of information breach incidents gets serious. Many previous approaches to ISP compliance have focused on security technologies. However, researchers in this area agree that technology approach is not sufficient so that other approaches such as behavioral and social are required. This study suggests the integrated research model including ISP compliance antecedents and psychological contract fulfillment. The study investigates the mediating effect of psychological contract fulfillment between perceived costs and ISP compliance intention comparing supervisor and supervisee groups. The results show that psychological contract fulfillment can mitigate the negative effect of costs on ISP compliance intention in supervisor group. Employees also anticipate complying with ISP when they recognize the benefits of ISP compliance. This study could shed more lights on the ISP compliance area by integrating and examining ISP compliance research model with psychological contract as a social factor. (C) 2017 Elsevier Ltd. All rights reserved. | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | ELSEVIER ADVANCED TECHNOLOGY | - |
dc.title | An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective | - |
dc.type | Article | - |
dc.identifier.doi | 10.1016/j.cose.2016.12.016 | - |
dc.identifier.bibliographicCitation | COMPUTERS & SECURITY, v.66, pp 52 - 65 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.wosid | 000396952900004 | - |
dc.identifier.scopusid | 2-s2.0-85010468160 | - |
dc.citation.endPage | 65 | - |
dc.citation.startPage | 52 | - |
dc.citation.title | COMPUTERS & SECURITY | - |
dc.citation.volume | 66 | - |
dc.type.docType | Article | - |
dc.publisher.location | 영국 | - |
dc.subject.keywordAuthor | Information security policy | - |
dc.subject.keywordAuthor | ISP compliance | - |
dc.subject.keywordAuthor | Psychological contract fulfillment | - |
dc.subject.keywordAuthor | Rational choice theory | - |
dc.subject.keywordAuthor | Security education and training awareness | - |
dc.subject.keywordAuthor | SETA | - |
dc.subject.keywordPlus | PROTECTION MOTIVATION THEORY | - |
dc.subject.keywordPlus | PERCEIVED ORGANIZATIONAL SUPPORT | - |
dc.subject.keywordPlus | DECISION-MAKING | - |
dc.subject.keywordPlus | RATIONAL CHOICE | - |
dc.subject.keywordPlus | SYSTEMS MISUSE | - |
dc.subject.keywordPlus | DETERRENCE | - |
dc.subject.keywordPlus | IMPACT | - |
dc.subject.keywordPlus | BREACH | - |
dc.subject.keywordPlus | METAANALYSIS | - |
dc.subject.keywordPlus | PERFORMANCE | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.