Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017‏ - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019‏ - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior

L Li, W He, L Xu, I Ash, M Anwar, X Yuan - International Journal of …, 2019‏ - Elsevier
As internet technology and mobile applications increase in volume and complexity,
malicious cyber-attacks are evolving, and as a result society is facing greater security risks in …

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

J D'Arcy, PB Lowry - Information Systems Journal, 2019‏ - Wiley Online Library
We present a model of employee compliance with information security policy (ISP) that (1)
explicates stable, cognitive beliefs regarding the consequences of compliance and …

The dark triad and knowledge hiding

W Pan, Q Zhang, TSH Teo, VKG Lim - International Journal of Information …, 2018‏ - Elsevier
By drawing on psychological contract theory, this study examined the effects of the dark triad
of personality traits (Machiavellianism, narcissism, and psychopathy) on knowledge hiding …

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

C Liu, N Wang, H Liang - International Journal of Information Management, 2020‏ - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …

Security education, training, and awareness programs: Literature review

S Hu, C Hsu, Z Zhou - Journal of Computer Information Systems, 2022‏ - Taylor & Francis
Security education, training, and awareness (SETA) is one of the most common and
prominent strategies for organizational security governance. However, only a small portion …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021‏ - pubsonline.informs.org
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …

Employees' in-role and extra-role information security behaviors from the PE fit perspective

Y Yin, C Hsu, Z Zhou - Computers & Security, 2023‏ - Elsevier
Organizations are increasingly seeking ways to encourage employee in-role and extra-role
information security (InfoSec) behaviors for enhancing organizational InfoSec. One …