Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Rousseau (1988)
The construction of climate in organizational research.
Organizational Behavior and Human Decision Processes, 50
S. Gilboa, A. Shirom, Y. Fried, C. Cooper (2008)
A META-ANALYSIS OF WORK DEMAND STRESSORS AND JOB PERFORMANCE: EXAMINING MAIN AND MODERATING EFFECTSPersonnel Psychology, 61
J. Stanton, K. Stam, Paul Mastrangelo, Jeffrey Jolton (2005)
Analysis of end user security behaviorsComput. Secur., 24
K. Aytes, T. Connolly (2003)
A Research Model for Investigating Human Behavior Related to Computer Security
(2015)
Cybersecurity’s human factor: lessons from the pentagon
I. Ajzen (2019)
Theory of planned behavior with background factors
I. Ajzen (2016a)
Theory of planned behavior diagram
C.M. Ringle, S. Wende, S. Will (2005)
SmartPLS 2.0 (M3) Beta, Hamburg
D. Denison (1996)
What is the Difference Between Organizational Culture and Organizational Climate? A Native's Point of View on a Decade of Paradigm WarsAcademy of Management Review, 21
B. Lewis, Gary Templeton, T. Byrd (2005)
A methodology for construct development in MIS researchEuropean Journal of Information Systems, 14
(2003)
Best practices: are you the weak link?
Qing Hu, Tamara Dinev (2005)
Is spyware an Internet nuisance or public menace?Commun. ACM, 48
M. Griffin, A. Neal (2000)
Perceptions of safety at work: a framework for linking safety climate to safety performance, knowledge, and motivation.Journal of occupational health psychology, 5 3
(1990)
The climate for service: an application of the climate construct
Tamara Dinev, Qing Hu (2007)
The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information TechnologiesJ. Assoc. Inf. Syst., 8
(2017)
Cost of data breach study
(1990)
The role of climate and culture in productivity
Younghwa Lee, K. Kozar (2008)
An empirical investigation of anti-spyware software adoption: A multitheoretical perspectiveInf. Manag., 45
B. Schneider (1975)
Organizational Climates: An Essay.Personnel Psychology, 28
(2017)
Top 5 technology mistakes
Carlos Tam, Carolina Conceição, Tiago Oliveira (2022)
What influences employees to follow security policies?Safety Science
J. Edwards (2001)
Multidimensional Constructs in Organizational Behavior Research: An Integrative Analytical FrameworkOrganizational Research Methods, 4
William Glick (1985)
Conceptualizing and Measuring Organizational and Psychological Climate: Pitfalls in Multilevel ResearchAcademy of Management Review, 10
N. Jaafar, Adnan Ajis (2013)
Organizational Climate and Individual Factors Effects on Information Security Compliance Behaviour
D. Gefen, D. Straub (2005)
A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated ExampleCommun. Assoc. Inf. Syst., 16
Younghwa Lee, K. Kozar (2005)
Investigating factors affecting the adoption of anti-spyware systemsCommun. ACM, 48
A. Williamson, A. Feyer, D. Cairns, Deborah Biancotti (1997)
The development of a measure of safety climate: The role of safety perceptions and attitudesSafety Science, 25
I. Ajzen (2016b)
Behavioral interventions based on the theory of planned behavior
Steven Brown, T. Leigh (1996)
A new look at psychological climate and its relationship to job involvement, effort, and performance.The Journal of applied psychology, 81 4
D. Zohar (1980)
Safety climate in industrial organizations: theoretical and applied implications.The Journal of applied psychology, 65 1
(2015)
In data security, it’s a numbers game
(1990)
Climate and culture: an evolution of constructs
Siu Lo, G. Breukelen, G. Peters, G. Kok (2014)
Teleconference Use among Office Workers: An Interorganizational Comparison of an Extended Theory of Planned Behavior ModelAdministrative Sciences, 4
I. Ajzen (2011)
The theory of planned behaviour: Reactions and reflectionsPsychology & Health, 26
Gregory Moody, M. Siponen, Seppo Pahnila (2018)
Toward a Unified Model of Information Security Policy ComplianceMIS Q., 42
Kevin Barton, G. Tejay, M. Lane, S. Terrell (2016)
Information system security commitment: A study of external influences on senior managementComput. Secur., 59
Elena Karahanna, D. Straub, N. Chervany (1999)
Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption BeliefsMIS Q., 23
L. James, J. Hater, M. Gent, J. Bruni (1978)
PSYCHOLOGICAL CLIMATE: IMPLICATIONS FROM COGNITIVE SOCIAL LEARNING THEORY AND INTERACTIONAL PSYCHOLOGYPersonnel Psychology, 31
M. Enriquez (2021)
Security – the top 10 data breaches of 2020
Janine Spears, H. Barki (2010)
User Participation in Information Systems Security Risk ManagementMIS Q., 34
P. Pavlou, Mendel Fygenson (2006)
Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior
Mark Chan, Irene Woon, A. Kankanhalli (2005)
Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant BehaviorJournal of Information Privacy and Security, 1
Christopher Parker, B. Baltes, S. Young, J. Huff, R. Altmann, Heather Lacost, J. Roberts (2003)
Relationships between psychological climate perceptions and work outcomes: a meta-analytic reviewJournal of Organizational Behavior, 24
G. Dhillon, J. Backhouse (2001)
Current directions in IS security research: towards socio‐organizational perspectivesInformation Systems Journal, 11
Wynne Chin, Barbara Marcolin, P. Newsted (2003)
A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption StudyInf. Syst. Res., 14
T. Sommestad, Henrik Karlzén, J. Hallberg (2019)
The Theory of Planned Behavior and Information Security Policy ComplianceJournal of Computer Information Systems, 59
Jahyun Goo, Myung-Seong Yim, D. Kim (2014)
A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security ClimateIEEE Transactions on Professional Communication, 57
N. Awad, Kristina Fitzgerald (2005)
The deceptive behaviors that offend us most about spywareCommun. ACM, 48
Mohammad Merhi, P. Ahluwalia (2019)
Examining the impact of deterrence factors and norms on resistance to Information Systems SecurityComput. Hum. Behav., 92
Tian Wang, Md Bhuiyan, Guojun Wang, Lianyong Qi, Jie Wu, T. Hayajneh (2020)
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of ThingsIEEE Internet of Things Journal, 7
Shirley Taylor, P. Todd (1995)
Understanding Information Technology Usage: A Test of Competing ModelsInf. Syst. Res., 6
Burcu Bulgurcu, H. Cavusoglu, I. Benbasat (2010)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security AwarenessMIS Q., 34
D. Zohar, G. Luria (2005)
A multilevel model of safety climate: cross-level relationships between organization and group-level climates.The Journal of applied psychology, 90 4
D. Zohar (2011)
Safety climate: Conceptual and measurement issues.
Martin Wetzels, G. Odekerken-Schröder, Claudia Oppen (2009)
Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustrationManagement Information Systems Quarterly, 33
O. Kharif (2017)
2016 Was record year for data breaches
(2005)
Global security survey, Deloitte touche tohmatsu
D. Zohar (2000)
A group-level model of safety climate: testing the effect of group climate on microaccidents in manufacturing jobs.The Journal of applied psychology, 85 4
E. Schultz (2005)
The human factor in securityComput. Secur., 24
M. Dickson, Christian Resick, P. Hanges (2006)
When organizational climate is unambiguous, it is also strong.The Journal of applied psychology, 91 2
A. Neal, M. Griffin (2006)
A study of the lagged relationships among safety climate, safety motivation, safety behavior, and accidents at the individual and group levels.The Journal of applied psychology, 91 4
Roger Thompson (2005)
Why spyware poses multiple threats to securityCommun. ACM, 48
A. Neal, M. Griffin, P. Hart (2000)
The impact of organizational climate on safety climate and individual behaviorSafety Science, 34
Shirley Taylor, P. Todd (1995)
Assessing IT usage: the role of prior experienceManagement Information Systems Quarterly, 19
Michael Gallivan, Valerie Spitler, M. Koufaris (2005)
Does Information Technology Training Really Matter? A Social Information Processing Analysis of Coworkers' Influence on IT Usage in the WorkplaceJournal of Management Information Systems, 22
IT security breaches plague organizations worldwide, yet there continues to be a paucity of comprehensive research models for protective technologies. This study aims to develop an IT security user behavior model focusing on the protective technology anti-spyware which includes organizational climate, a theory of planned behavior (TPB) background variable and elicited salient user beliefs.Design/methodology/approachA multimethod approach, including interviews and a survey, is used to elicit salient user beliefs and test hypotheses of the influences of perceived IT security climate on those user beliefs and ultimately user behavioral intentions. Primary data were collected through interviews following the prescribed TPB methodology and an offline survey method with 254 valid responses recorded. Partial least squares was used to investigate the hypotheses.FindingsThe authors found that attitudinal beliefs – protecting organizational interests for data/privacy, preventing disruptions to work and control beliefs – monetary resources and time constraints mediate significant relationships between IT security climate and attitude and perceived behavioral control, respectively. Implications are discussed.Originality/valueThis study is the first, to the best of the authors’ knowledge, that uses both interviews and a survey to examine the relationships among IT security climate, elicited user beliefs and behavioral intentions in a TPB-based model for a protective technology.
Journal of Systems and Information Technology – Emerald Publishing
Published: Nov 15, 2022
Keywords: IT security; Theory of planned behavior; Partial least squares; Anti-spyware; Background variable; Elicited salient beliefs; Protective technology
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.