Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 2
Page No. 227 - 239

Impacts of Security Policy Goals and Motivation on Compliance Intention: The Linkage Between Motivation Theory and Goal Setting

Authors : Inho Hwang, Hyunsun Park and Sanghyun Kim

References

Austin, J.T. and J.B. Vancouver, 1996. Goal constructs in psychology: Structure, process and content. Psychol. Bull., 120: 338-375.
PubMed  |  Direct Link  |  

Bentler, P.M., 1990. Comparative fit indexes in structural models. Psychol. Bull., 107: 238-246.
CrossRef  |  PubMed  |  Direct Link  |  

Berson, Y., N. Halevy, B. Shamir and M. Erez, 2015. Leading from different psychological distances: A construal-level perspective on vision communication, goal setting and follower motivation. Leadersh. Q., 26: 143-155.
Direct Link  |  

Boss, S.R., D.F. Galletta, P.B. Lowry, G.D. Moody and P. Polak, 2015. What do users have to fear? using fear appeals to engender threats and fear that motivate protective security behaviors. MIS. Q., 39: 837-864.
Direct Link  |  

Bulgurcu, B., H. Cavusoglu and I. Benbasat, 2010. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS. Q., 34: 523-548.
Direct Link  |  

Chen, Y., K. Ramamurthy and K.W. Wen, 2012. Organizations' information security policy compliance: Stick or carrot approach?. J. Manage. Inf. Syst., 29: 157-188.
Direct Link  |  

Chu, A.M. and P.Y. Chau, 2014. Development and validation of instruments of information security deviant behavior. Decis. Support Syst., 66: 93-101.
Direct Link  |  

Colquitt, J.A. and M.J. Simmering, 1988. Conscientiousness, goal orientation and motivation to learn during the learning process: A longitudinal study. J. Applied Psychol., 83: 654-665.
Direct Link  |  

D'Arcy, J., A. Hovav and D. Galletta, 2009. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Inf. Syst. Res., 20: 79-98.
Direct Link  |  

D'Arcy, J., T. Herath and M.K. Shoss, 2014. Understanding employee responses to stressful information security requirements: A coping perspective. J. Manage. Inf. Syst., 31: 285-318.
Direct Link  |  

Davis, J.H., F.D. Schoorman and L. Donaldson, 1997. Toward a stewardship theory of management. Acad. Manage. Rev., 22: 20-47.
Direct Link  |  

Detert, J.R., R.G. Schroeder and J.J. Mauriel, 2000. A framework for linking culture and improvement initiatives in organizations. Acad. Manage. Rev., 25: 850-863.
Direct Link  |  

Diefendorff, J.M. and G.A. Seaton, 2015. Work Motivation. In: International Encyclopedia of the Social and Behavioral Sciences, Wright, J.D. (Ed.). Elsevier Publisher, Oxford, England, ISBN:9780080970875, pp: 680-686.

Fair, E.M. and L. Silvestri, 1992. Effects of rewards, competition and outcome on intrinsic motivation. J. Instructional Psychol., 19: 1-3.
Direct Link  |  

Flores, W.R. and M. Ekstedt, 2016. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput. Secur., 59: 26-44.
Direct Link  |  

Fornell, C. and D.F. Larcker, 1981. Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res., 18: 39-50.
CrossRef  |  Direct Link  |  

Fornell, C. and D.F. Larcker, 1981. Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res., 18: 39-50.
CrossRef  |  Direct Link  |  

Gartner, 2014. Gartner says worldwide information security spending will grow almost 8 percent in 2014 as organizations become more threat-aware. Gartner Inc., Stamford, Connecticut. http://www.gartner.com/newsroom/id/2828722.

Goodhue, D.L., 1995. Understanding user evaluations of information systems. Manage. Sci., 41: 1827-1844.
Direct Link  |  

Guo, K.H. and Y. Yuan, 2012. The effects of multilevel sanctions on information security violations: A mediating model. Inf. Manage., 49: 320-326.
Direct Link  |  

Guo, K.H., Y. Yuan, N.P. Archer and C.E. Connelly, 2011. Understanding nonmalicious security violations in the workplace: A composite behavior model. J. Manage. Inf. Syst., 28: 203-236.
Direct Link  |  

Harman, H.H., 1976. Modern Factor Analysis. 3rd Edn., University of Chicago Press, Chicago, Illinois, ISBN:0-226-31652-1, Pages: 298.

Herath, T. and H.R. Rao, 2009. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decis. Support Syst., 47: 154-165.
CrossRef  |  Direct Link  |  

Hu, Q., T. Dinev, P. Hart and D. Cooke, 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decis. Sci., 43: 615-660.
CrossRef  |  

Hu, Q., Z. Xu, T. Dinev and H. Ling, 2011. Does deterrence work in reducing information security policy abuse by employees?. Commun. ACM., 54: 54-54.
CrossRef  |  Direct Link  |  

Ifinedo, P., 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Comput. Secur., 31: 83-95.
Direct Link  |  

Joreskog, K.G. and D. Sorbom, 1996. PRELIS 2 User's Reference Guide: A Program for Multivariate Data Screening and Data Summarization; A Preprocessor for Lisrel. Scientific Software International, New York City, New York, ISBN:0-89498-041-6, Pages: 200.

Koskosas, I., 2008. Goal Setting and Trust in A Security Management Context. Inf. Secur. J. Global Perspect., 17: 151-161.
CrossRef  |  Direct Link  |  

Kwok, L.F. and D. Longley, 1999. Information security management and modelling. Inf. Manage. Comput. Secur., 7: 30-40.
CrossRef  |  Direct Link  |  

Lee, Y. and K.R. Larsen, 2009. Threat or coping appraisal: Determinants of SMB executives’ decision to adopt anti-malware software. Eur. J. Inf. Syst., 18: 177-187.
CrossRef  |  Direct Link  |  

Li, H., J. Zhang and R. Sarathy, 2010. Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Syst., 48: 635-645.
CrossRef  |  

Locke, E. A. and G.P. Latham, 2002. Building a practically useful theory of goal setting and task motivation: A 35-year odyssey. Am. Psychol., 57: 705-717.
Direct Link  |  

Locke, E.A. and G.P. Latham, 1990. Work motivation and satisfaction: Light at the end of the tunnel. Psychol. Sci., 1: 240-246.
CrossRef  |  Direct Link  |  

Locke, E.A. and G.P. Latham, 1990. Work motivation and satisfaction: Light at the end of the tunnel. Psychol. Sci., 1: 240-246.
CrossRef  |  Direct Link  |  

Locke, E.A. and G.P. Latham, 2006. New directions in goal-setting theory. Curr. Directions Psychol. Sci., 15: 265-268.
Direct Link  |  

Locke, E.A., 1996. Motivation through conscious goal setting. Appl. Preventive Psychol., 5: 117-124.
Direct Link  |  

Nunnally, J.C., 1978. Psychometric Theory. 2nd Edn., McGraw-Hill Publisher, New York, USA., ISBN:9780070474659, Pages: 701.

Pinder, C.C., 1998. Work Motivation in Organizational Behavior. Prentice Hall, Upper Saddle River, New Jersey.

Pritchard, R.D., S.D. Jones, P.L. Roth, K.K. Stuebing and S.E. Ekeberg, 1988. Effects of group feedback, goal setting and incentives on organizational productivity. J. Appl. Psychol., 73: 337-358.
Direct Link  |  

Ruighaver, A.B., S.B. Maynard and S. Chang, 2007. Organisational security culture: Extending the end-user perspective. Comput. Secur., 26: 56-62.
Direct Link  |  

Safa, N.S. and R.V. Solms, 2016. An information security knowledge sharing model in organizations. Comput. Hum. Behav., 57: 442-451.
Direct Link  |  

Safa, N.S., M. Sookhak, R.V. Solms, S. Furnell and N.A. Ghani et al., 2015. Information security conscious care behaviour formation in organizations. Comput. Secur., 53: 65-78.
Direct Link  |  

Solms, R.V., 1999. Information security management: Why standards are important. Inf. Manage. Comput. Secur., 7: 50-58.
CrossRef  |  Direct Link  |  

Son, J.Y., 2011. Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Inf. Manage., 48: 296-302.
Direct Link  |  

Tsohou, A., M. Karyda, S. Kokolakis and E. Kiountouzis, 2015. Managing the introduction of information security awareness programmes in organisations. Eur. J. Inf. Syst., 24: 38-58.
CrossRef  |  Direct Link  |  

Vance, A., M. Siponen and S. Pahnila, 2012. Motivating IS security compliance: Insights from habit and protection motivation theory. Inform. Manage., 49: 190-198.
CrossRef  |  Direct Link  |  

Verizon, 2013. Verizon 2013 data breach investigations report. Verizon, Basking Ridge, New Jersey.

Vollmeyer, R., B.D. Burns and K.J. Holyoak, 1996. The impact of goal specificity on strategy use and the acquisition of problem structure. Cognit. Sci., 20: 75-100.
Direct Link  |  

West, R., 2008. The psychology of security. Commun. ACM., 51: 34-40.
CrossRef  |  Direct Link  |  

Whitman, M.E., 2004. In defense of the realm: Understanding the threats to information security. Int. J. Inform. Manag., 24: 43-57.
CrossRef  |  Direct Link  |  

Wixom, B.H. and H.J. Watson, 2001. An empirical investigation of the factors affecting data warehousing success. MIS Quart., 25: 17-41.
CrossRef  |  Direct Link  |  

Wixom, B.H. and H.J. Watson, 2001. An empirical investigation of the factors affecting data warehousing success. MIS Quart., 25: 17-41.
CrossRef  |  Direct Link  |  

Wright, B.E. and B.S. Davis, 2003. Job satisfaction in the public sector the role of the work environment. Am. Rev. Public Administration, 33: 70-90.
Direct Link  |  

Wright, B.E., 2004. The role of work context in work motivation: A public sector application of goal and social cognitive theories. J. Public Administration Res. Theor., 14: 59-78.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved