Detailed Information

Cited 15 time in webofscience Cited 18 time in scopus
Metadata Downloads

An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective

Full metadata record
DC Field Value Language
dc.contributor.authorHan, JinYoung-
dc.contributor.authorKim, Yoo Jung-
dc.contributor.authorKim, Hyungjin-
dc.date.available2019-03-08T08:56:25Z-
dc.date.issued2017-05-
dc.identifier.issn0167-4048-
dc.identifier.issn1872-6208-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/4465-
dc.description.abstractOrganizations are trying to induce employees to comply with information security policy (ISP) as organizational damage of information breach incidents gets serious. Many previous approaches to ISP compliance have focused on security technologies. However, researchers in this area agree that technology approach is not sufficient so that other approaches such as behavioral and social are required. This study suggests the integrated research model including ISP compliance antecedents and psychological contract fulfillment. The study investigates the mediating effect of psychological contract fulfillment between perceived costs and ISP compliance intention comparing supervisor and supervisee groups. The results show that psychological contract fulfillment can mitigate the negative effect of costs on ISP compliance intention in supervisor group. Employees also anticipate complying with ISP when they recognize the benefits of ISP compliance. This study could shed more lights on the ISP compliance area by integrating and examining ISP compliance research model with psychological contract as a social factor. (C) 2017 Elsevier Ltd. All rights reserved.-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.titleAn integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective-
dc.typeArticle-
dc.identifier.doi10.1016/j.cose.2016.12.016-
dc.identifier.bibliographicCitationCOMPUTERS & SECURITY, v.66, pp 52 - 65-
dc.description.isOpenAccessN-
dc.identifier.wosid000396952900004-
dc.identifier.scopusid2-s2.0-85010468160-
dc.citation.endPage65-
dc.citation.startPage52-
dc.citation.titleCOMPUTERS & SECURITY-
dc.citation.volume66-
dc.type.docTypeArticle-
dc.publisher.location영국-
dc.subject.keywordAuthorInformation security policy-
dc.subject.keywordAuthorISP compliance-
dc.subject.keywordAuthorPsychological contract fulfillment-
dc.subject.keywordAuthorRational choice theory-
dc.subject.keywordAuthorSecurity education and training awareness-
dc.subject.keywordAuthorSETA-
dc.subject.keywordPlusPROTECTION MOTIVATION THEORY-
dc.subject.keywordPlusPERCEIVED ORGANIZATIONAL SUPPORT-
dc.subject.keywordPlusDECISION-MAKING-
dc.subject.keywordPlusRATIONAL CHOICE-
dc.subject.keywordPlusSYSTEMS MISUSE-
dc.subject.keywordPlusDETERRENCE-
dc.subject.keywordPlusIMPACT-
dc.subject.keywordPlusBREACH-
dc.subject.keywordPlusMETAANALYSIS-
dc.subject.keywordPlusPERFORMANCE-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Da Vinci College of General Education > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE