Näytä suppeat kuvailutiedot

dc.contributor.authorVance, Anthony
dc.contributor.authorBoyer Fellow, Selvoy J.
dc.contributor.authorSiponen, Mikko T.
dc.contributor.authorStraub, Detmar W.
dc.date.accessioned2020-04-15T09:15:28Z
dc.date.available2020-04-15T09:15:28Z
dc.date.issued2020
dc.identifier.citationVance, A., Boyer Fellow, S. J., Siponen, M. T., & Straub, D. W. (2020). Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures. <i>Information and Management</i>, <i>57</i>(4), Article 103212. <a href="https://doi.org/10.1016/j.im.2019.103212" target="_blank">https://doi.org/10.1016/j.im.2019.103212</a>
dc.identifier.otherCONVID_33445604
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/68538
dc.description.abstractA principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company.en
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherElsevier
dc.relation.ispartofseriesInformation and Management
dc.rightsCC BY-NC-ND 4.0
dc.subject.otherinformation security policy violations
dc.subject.otherinformation security
dc.subject.othernational culture
dc.subject.otherdeterrence
dc.subject.othershame
dc.subject.otherneutralization
dc.subject.othermoral beliefs
dc.titleEffects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202004152760
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.relation.issn0378-7206
dc.relation.numberinseries4
dc.relation.volume57
dc.type.versionacceptedVersion
dc.rights.copyright© 2020 Elsevier Inc
dc.rights.accesslevelopenAccessfi
dc.subject.ysorikkomukset
dc.subject.ysokansallinen kulttuuri
dc.subject.ysokulttuurierot
dc.subject.ysomoraali
dc.subject.ysoorganisaatiot
dc.subject.ysokulttuurienvälinen tutkimus
dc.subject.ysotietoturvapolitiikka
dc.subject.ysotietoturva
dc.subject.ysokansainväliset yritykset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p3699
jyx.subject.urihttp://www.yso.fi/onto/yso/p8490
jyx.subject.urihttp://www.yso.fi/onto/yso/p2190
jyx.subject.urihttp://www.yso.fi/onto/yso/p861
jyx.subject.urihttp://www.yso.fi/onto/yso/p272
jyx.subject.urihttp://www.yso.fi/onto/yso/p2975
jyx.subject.urihttp://www.yso.fi/onto/yso/p25795
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p14953
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.1016/j.im.2019.103212
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-NC-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-NC-ND 4.0