Issues and opinion on structural equation modeling
MIS Quarterly
Factors motivating software piracy: a longitudinal study
ICIS '99 Proceedings of the 20th international conference on Information Systems
Extending the technology acceptance model: the influence of perceived user resources
ACM SIGMIS Database - Special issue on adoption, diffusion, and infusion of IT
Employees' Behavior towards IS Security Policy Compliance
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Software Piracy in the Workplace: A Model and Empirical Test
Journal of Management Information Systems
Explaining non-work-related computing in the workplace: A comparison of alternative models
Information and Management
Fighting identity theft: The coping perspective
Decision Support Systems
The effects of sanctions and stigmas on cyberloafing
Computers in Human Behavior
The effects and moderators of cyber-loafing controls: an empirical study of Chinese public servants
Information Technology and Management
Hi-index | 0.00 |
Current studies on compliance with security policies have largely ignored the impact of the perceived benefits of deviant behavior, personal norms, and organizational context. Drawing on the literature in criminology, this paper applies rational choice theory to examine how employees' intention to comply with Internet use policy is driven by cost-benefit assessments, personal norms and organizational context factors. The results indicate that employees' compliance intention is the result of competing influences of perceived benefits, formal sanctions, and security risks. Furthermore, the effect of sanction severity is found to be moderated by personal norms.